Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/99848
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computingen_US
dc.creatorLi, Wen_US
dc.creatorMing, Jen_US
dc.creatorLuo, Xen_US
dc.creatorCai, Hen_US
dc.date.accessioned2023-07-24T01:03:01Z-
dc.date.available2023-07-24T01:03:01Z-
dc.identifier.isbn978-1-939133-31-1en_US
dc.identifier.urihttp://hdl.handle.net/10397/99848-
dc.description31st USENIX Security Symposium, August 10–12, 2022, Boston, MA, USAen_US
dc.language.isoenen_US
dc.rights© Author(s)en_US
dc.rightsThe following publication Li, W., Ming, J., Luo, X., & Cai, H. (2022). {PolyCruise}: A {Cross-Language} Dynamic Information Flow Analysis. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 2513-2530) is available at https://www.usenix.org/conference/usenixsecurity22/presentation/li-wenen_US
dc.titlePolyCruise : a cross-language dynamic information flow analysisen_US
dc.typeConference Paperen_US
dc.identifier.spage2513en_US
dc.identifier.epage2530en_US
dcterms.abstractDespite the fact that most real-world software systems today are written in multiple programming languages, existing program analysis based security techniques are still limited to single-language code. In consequence, security flaws (e.g., code vulnerabilities) at and across language boundaries are largely left out as blind spots. We present PolyCruise, a technique that enables holistic dynamic information flow analysis (DIFA) across heterogeneous languages hence security applications empowered by DIFA (e.g., vulnerability discovery) for multilingual software. PolyCruise combines a light language-specific analysis that computes symbolic dependencies in each language unit with a language-agnostic online data flow analysis guided by those dependencies, in a way that overcomes language heterogeneity. Extensive evaluation of its implementation for Python-C programs against micro, medium-sized, and large-scale benchmarks demonstrated PolyCruise's practical scalability and promising capabilities. It has enabled the discovery of 14 unknown cross-language security vulnerabilities in real-world multilingual systems such as NumPy, with 11 confirmed, 8 CVEs assigned, and 8 fixed so far. We also contributed the first benchmark suite for systematically assessing multilingual DIFA.en_US
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationIn Proceedings of the 31st USENIX Security Symposium, August 10–12, 2022, Boston, MA, USA, p. 2513-2530en_US
dcterms.issued2022-
dc.relation.conferenceUSENIX Security Symposium [USENIX Security]en_US
dc.description.validate202307 bcwwen_US
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumbera2291-
dc.identifier.SubFormID47374-
dc.description.fundingSourceSelf-fundeden_US
dc.description.pubStatusPublisheden_US
dc.description.oaCategoryCopyright retained by authoren_US
Appears in Collections:Conference Paper
Files in This Item:
File Description SizeFormat 
sec22-li-wen.pdf2.55 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

142
Citations as of Oct 6, 2025

Downloads

50
Citations as of Oct 6, 2025

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.