This program is tentative and subject to change.
The Node.js ecosystem, with its growing popularity and increasing exposure to security vulnerabilities, has a pressing need for more effective security analysis tools. To reduce false positives, recent works on detecting vulnerabilities in Node.js packages have developed synthesis algorithms to generate proof-of-concept exploits. However, these tools focus mainly on vulnerabilities that can be triggered by a single direct call to an exported function of the analyzed package, failing to generate exploits that require more complex interactions. In this paper, we present Explode.js, the first tool capable of synthesizing exploits that include complex call sequences to trigger vulnerabilities in Node.js packages. By combining static analysis and symbolic execution, Explode.js generates functional exploits that confirm the existence of command, code injection, prototype pollution, and path traversal vulnerabilities, effectively eliminating false positives. The results of evaluating Explode.js on two state-of-the-art datasets of Node.js packages with confirmed vulnerabilities show that it generates significantly more exploits than its main competitor tools. Furthermore, when applied to real-world Node.js packages, Explode.js uncovered 44 zero-day vulnerabilities, with 4 new CVEs.
This program is tentative and subject to change.
Wed 18 JunDisplayed time zone: Seoul change
14:00 - 15:40 | |||
14:00 20mTalk | Verified Foundations for Differential Privacy PLDI Research Papers Markus de Medeiros New York University, Muhammad Naveed Amazon, Tancrède Lepoint Amazon, Temesghen Kahsai Amazon, Tristan Ravitch Amazon, Stefan Zetzsche Amazon, Anjali Joshi Amazon, Joseph Tassarotti New York University, Aws Albarghouthi Amazon, Jean-Baptiste Tristan Amazon DOI | ||
14:20 20mTalk | Automated Exploit Generation for Node.js Packages PLDI Research Papers Filipe Marques INESC-ID; Instituto Superior Técnico - University of Lisbon, Mafalda Ferreira INESC-ID; Instituto Superior Técnico - University of Lisbon, André Nascimento INESC-ID; Instituto Superior Técnico - University of Lisbon, Miguel E. Coimbra INESC-ID; Instituto Superior Técnico - University of Lisbon, Nuno Santos INESC-ID; Instituto Superior Técnico - University of Lisbon, Limin Jia Carnegie Mellon University, José Fragoso Santos INESC-ID; Instituto Superior Técnico - University of Lisbon DOI | ||
14:40 20mTalk | Robust Constant-Time Cryptography PLDI Research Papers Matthew Kolosick University of California at San Diego, Basavesh Ammanaghatta Shivakumar Virginia Tech, Sunjay Cauligi ICSI, Marco Patrignani University of Trento, Marco Vassena Utrecht University, Ranjit Jhala University of California at San Diego, Deian Stefan University of California at San Diego DOI | ||
15:00 20mTalk | Smooth, Integrated Proofs of Cryptographic Constant Time for Nondeterministic Programs and Compilers PLDI Research Papers Owen Conoly Massachusetts Institute of Technology, Andres Erbsen Google, Adam Chlipala Massachusetts Institute of Technology DOI | ||
15:20 20mTalk | Morello-Cerise: A Proof of Strong Encapsulation for the Arm Morello Capability Hardware Architecture PLDI Research Papers Angus Hammond University of Cambridge, Ricardo Almeida University of Glasgow, Thomas Bauereiss University of Cambridge, Brian Campbell University of Edinburgh, Ian Stark University of Edinburgh, Peter Sewell University of Cambridge DOI |