Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/99848
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Computing | en_US |
| dc.creator | Li, W | en_US |
| dc.creator | Ming, J | en_US |
| dc.creator | Luo, X | en_US |
| dc.creator | Cai, H | en_US |
| dc.date.accessioned | 2023-07-24T01:03:01Z | - |
| dc.date.available | 2023-07-24T01:03:01Z | - |
| dc.identifier.isbn | 978-1-939133-31-1 | en_US |
| dc.identifier.uri | http://hdl.handle.net/10397/99848 | - |
| dc.description | 31st USENIX Security Symposium, August 10–12, 2022, Boston, MA, USA | en_US |
| dc.language.iso | en | en_US |
| dc.rights | © Author(s) | en_US |
| dc.rights | The following publication Li, W., Ming, J., Luo, X., & Cai, H. (2022). {PolyCruise}: A {Cross-Language} Dynamic Information Flow Analysis. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 2513-2530) is available at https://www.usenix.org/conference/usenixsecurity22/presentation/li-wen | en_US |
| dc.title | PolyCruise : a cross-language dynamic information flow analysis | en_US |
| dc.type | Conference Paper | en_US |
| dc.identifier.spage | 2513 | en_US |
| dc.identifier.epage | 2530 | en_US |
| dcterms.abstract | Despite the fact that most real-world software systems today are written in multiple programming languages, existing program analysis based security techniques are still limited to single-language code. In consequence, security flaws (e.g., code vulnerabilities) at and across language boundaries are largely left out as blind spots. We present PolyCruise, a technique that enables holistic dynamic information flow analysis (DIFA) across heterogeneous languages hence security applications empowered by DIFA (e.g., vulnerability discovery) for multilingual software. PolyCruise combines a light language-specific analysis that computes symbolic dependencies in each language unit with a language-agnostic online data flow analysis guided by those dependencies, in a way that overcomes language heterogeneity. Extensive evaluation of its implementation for Python-C programs against micro, medium-sized, and large-scale benchmarks demonstrated PolyCruise's practical scalability and promising capabilities. It has enabled the discovery of 14 unknown cross-language security vulnerabilities in real-world multilingual systems such as NumPy, with 11 confirmed, 8 CVEs assigned, and 8 fixed so far. We also contributed the first benchmark suite for systematically assessing multilingual DIFA. | en_US |
| dcterms.accessRights | open access | en_US |
| dcterms.bibliographicCitation | In Proceedings of the 31st USENIX Security Symposium, August 10–12, 2022, Boston, MA, USA, p. 2513-2530 | en_US |
| dcterms.issued | 2022 | - |
| dc.relation.conference | USENIX Security Symposium [USENIX Security] | en_US |
| dc.description.validate | 202307 bcww | en_US |
| dc.description.oa | Version of Record | en_US |
| dc.identifier.FolderNumber | a2291 | - |
| dc.identifier.SubFormID | 47374 | - |
| dc.description.fundingSource | Self-funded | en_US |
| dc.description.pubStatus | Published | en_US |
| dc.description.oaCategory | Copyright retained by author | en_US |
| Appears in Collections: | Conference Paper | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| sec22-li-wen.pdf | 2.55 MB | Adobe PDF | View/Open |
Page views
142
Citations as of Oct 6, 2025
Downloads
50
Citations as of Oct 6, 2025
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



