ICSE 2024
Fri 12 - Sun 21 April 2024 Lisbon, Portugal
Tue 16 Apr 2024 11:00 - 11:25 at Fernando Pessoa - Paper Presentations I Chair(s): Betty H.C. Cheng, Westley Weimer

Software processes a vast amount of sensitive data. However, tracing information flows in complex programs and eliciting threats, which for example could lead to information leaks, pose significant challenges. The problem lies in the absence of suitable approaches to effectively address this issue. Symbolic verification is too restrictive for practical use, taint analysis is limited to the program under test, and fuzzers can only identify crashes and hangs.

In my doctoral research, I introduce an approach for reconstructing and refining information flow graphs in order to elicit threats. Using static analysis, I automatically reconstruct an information flow graph. Subsequently, I refine the found information flows using information flow fuzzing and associate threats through a rule-based system. My approach provides a validated information flow graph of the software and a list of elicited threats.