Write a Blog >>
ICSE 2020
Wed 24 June - Thu 16 July 2020
Sat 11 Jul 2020 16:17 - 16:29 at Goguryeo - A29-Code Analysis and Verification Chair(s): Elena Sherman

In object-oriented languages, constructors often have a combination of required and optional formal parameters. It is tedious and inconvenient for programmers to write a constructor by hand for each combination. The multitude of constructors is error-prone for clients, and client code is difficult to read due to the large number of constructor parameters. Therefore, programmers often use design patters that enable more flexible object construction - the builder pattern, dependency injection, or factory methods.

However, these design patterns can be \emph{too} flexible: not all combinations of logical parameters lead to the construction of well-formed objects. When a client uses the builder pattern to construct an object, the compiler does not check that a valid set of values was provided. Incorrect use of builders can cause security vulnerabilities, run-time crashes, and other problems.

This work shows how to statically verify uses of object construction, such as the builder pattern. Using a simple specification language, programmers specify which combinations of logical arguments are permitted. Our compile-time analysis detects client code that may construct objects unsafely. Our analysis is based on a special case of typestate checking that modularly reasons about accumulations of method calls. It scales to industrial programs. We evaluated it on over 9 million lines of code, discovering defects which include previously-unknown security vulnerabilities and potential null-pointer violations in heavily-used open-source codebases. It has a low false positive rate and low annotation burden.

Conference Day
Sat 11 Jul

Displayed time zone: (UTC) Coordinated Universal Time change

16:05 - 17:05
A29-Code Analysis and VerificationTechnical Papers / New Ideas and Emerging Results at Goguryeo
Chair(s): Elena ShermanBoise State University
16:05
12m
Talk
Heaps'n Leaks: How Heap Snapshots Improve Android Taint AnalysisArtifact ReusableTechnicalArtifact Available
Technical Papers
Manuel BenzUniversity of Paderborn, Erik Krogh KristensenGitHub, Linghui LuoPaderborn University, Germany, Nataniel Borges Jr.CISPA Helmholtz Center for Information Security, Eric BoddenHeinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Andreas ZellerCISPA Helmholtz Center for Information Security
Media Attached File Attached
16:17
12m
Talk
Verifying Object ConstructionTechnicalArtifact Available
Technical Papers
Martin KelloggUniversity of Washington, Seattle, Manli RanUniversity of California, Riverside, Manu SridharanUniversity of California Riverside, Martin SchäfAmazon Web Services, USA, Michael D. ErnstUniversity of Washington, USA
16:29
6m
Talk
Predictive Constraint Solving and AnalysisNew Ideas and Emerging Results Distinguished Paper AwardsNIER
New Ideas and Emerging Results
Alyas AlmaawiThe University of Texas at Austin, Nima DiniUniversity of Texas at Austin, Cagdas YelenThe University of Texas at Austin, Milos GligoricThe University of Texas at Austin, Sasa MisailovicUniversity of Illinois at Urbana-Champaign, Sarfraz KhurshidUniversity of Texas at Austin, USA
16:35
12m
Talk
When APIs are Intentionally Bypassed: An Exploratory Study of API WorkaroundsTechnical
Technical Papers
Maxime LamotheConcordia University, Weiyi ShangConcordia University
Pre-print
16:47
12m
Talk
Demystify Official API Usage Directives with Crowdsourced API Misuse Scenarios, Erroneous Code Examples and PatchesTechnical
Technical Papers
Xiaoxue RenZhejiang University, Zhenchang XingAustralia National University, Jiamou SunAustralian National University, Xin XiaMonash University, Jianling SunZhejiang University