Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms
Sat 17 Jul 2021 08:20 - 08:40 at ISSTA 1 - Session 25 (time band 3) Testing and Analysis Chair(s): Michael Pradel
With many trigger-action platforms that integrate Internet of Things (IoT) systems and online services, rich functionalities transparently connecting digital and physical worlds become easily accessible for the end users. On the other hand, such facilities incorporate multiple parties whose data control policies may radically differ and even contradict each other, and thus privacy violations may arise throughout the lifecycle (e.g., generation and transmission) of triggers and actions. In this work, we conduct an in-depth study on the privacy issues in multi-party trigger-action integration platforms (TAIPs). We first characterize privacy violations that may arise with the integration of heterogeneous systems and services. Based on this knowledge, we propose Taifu, a dynamic testing approach to identify privacy weaknesses from the TAIP. The key insight of Taifu is that the applets which actually program the trigger-action rules can be used as test cases to explore the behavior of the TAIP. We evaluate the effectiveness of our approach by applying it on the TAIPs that are built around the IFTTT platform. To our great surprise, we find that privacy violations are prevalent among them. Using the automatically generated 407 applets, each from a different TAIP, Taifu detects 194 cases with access policy breaches, 218 access control missing, 90 access revocation missing, 15 unintended flows, and 73 over-privilege access.
Wed 14 JulDisplayed time zone: Brussels, Copenhagen, Madrid, Paris change
18:30 - 19:30 | Session 1 (time band 1) Web ApplicationsTechnical Papers at ISSTA 1 Chair(s): Xusheng Xiao Case Western Reserve University | ||
18:30 20mTalk | Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms Technical Papers Kulani Tharaka Mahadewa National University of Singapore, Yanjun Zhang University of Queensland, Guangdong Bai University of Queensland, Lei Bu Nanjing University, Zhiqiang Zuo Nanjing University, Dileepa Fernando Sri Lanka Technological Campus, Zhenkai Liang National University of Singapore, Jin Song Dong National University of Singapore DOI Media Attached File Attached | ||
18:50 20mTalk | WebEvo: Taming Web Application Evolution via Detecting Semantic Structure Changes Technical Papers Fei Shao Case Western Reserve University, Rui Xu Case Western Reserve University, Wasif Haque University of Texas at Dallas, Jingwei Xu Peking University, Ying Zhang Peking University, Wei Yang University of Texas at Dallas, Yanfang Ye Case Western Reserve University, Xusheng Xiao Case Western Reserve University DOI File Attached | ||
19:10 20mTalk | Modular Call Graph Construction for Security Scanning of Node.js Applications Technical Papers Benjamin Barslev Nielsen Aarhus University, Martin Toldam Torp Aarhus University, Anders Møller Aarhus University DOI Media Attached |
Sat 17 JulDisplayed time zone: Brussels, Copenhagen, Madrid, Paris change
08:00 - 09:20 | Session 25 (time band 3) Testing and AnalysisTechnical Papers at ISSTA 1 Chair(s): Michael Pradel University of Stuttgart | ||
08:00 20mTalk | Automated Patch Backporting in Linux (Experience Paper)Distinguished Artifact Technical Papers Ridwan Salihin Shariffdeen National University of Singapore, Xiang Gao National University of Singapore, Gregory J. Duck National University of Singapore, Shin Hwei Tan Southern University of Science and Technology, Julia Lawall Inria, Abhik Roychoudhury National University of Singapore DOI Pre-print Media Attached | ||
08:20 20mTalk | Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms Technical Papers Kulani Tharaka Mahadewa National University of Singapore, Yanjun Zhang University of Queensland, Guangdong Bai University of Queensland, Lei Bu Nanjing University, Zhiqiang Zuo Nanjing University, Dileepa Fernando Sri Lanka Technological Campus, Zhenkai Liang National University of Singapore, Jin Song Dong National University of Singapore DOI Media Attached File Attached | ||
08:40 20mTalk | Modular Call Graph Construction for Security Scanning of Node.js Applications Technical Papers Benjamin Barslev Nielsen Aarhus University, Martin Toldam Torp Aarhus University, Anders Møller Aarhus University DOI Media Attached | ||
09:00 20mTalk | Semantic Matching of GUI Events for Test Reuse: Are We There Yet? Technical Papers Leonardo Mariani University of Milano-Bicocca, Ali Mohebbi USI Lugano, Mauro Pezze USI Lugano; Schaffhausen Institute of Technology, Valerio Terragni University of Auckland DOI Pre-print |