Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation 2015
DOI: 10.1145/2737924.2737957
|View full text |Cite
|
Sign up to set email alerts
|

Exploring and enforcing security guarantees via program dependence graphs

Abstract: We present PIDGIN, a program analysis and understanding tool that enables the specification and enforcement of precise applicationspecific information security guarantees. PIDGIN also allows developers to interactively explore the information flows in their applications to develop policies and investigate counter-examples.PIDGIN combines program dependence graphs (PDGs), which precisely capture the information flows in a whole application, with a custom PDG query language. Queries express properties about the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
37
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(37 citation statements)
references
References 56 publications
0
37
0
Order By: Relevance
“…For this assessment, we consider the following open-source Java software projects hosted on GitHub: Gitblit, 9 Open Refine, 10 Voldemort, 11 ScribeJava, 12 Solo, 13 HikariCP, 14 Apache Kafka, 15 Teammates, 16 and Crawler4J. 17 These projects have at least 100 stars and 50 forks as well as many pull requests.…”
Section: Selected Software Projectsmentioning
confidence: 99%
See 1 more Smart Citation
“…For this assessment, we consider the following open-source Java software projects hosted on GitHub: Gitblit, 9 Open Refine, 10 Voldemort, 11 ScribeJava, 12 Solo, 13 HikariCP, 14 Apache Kafka, 15 Teammates, 16 and Crawler4J. 17 These projects have at least 100 stars and 50 forks as well as many pull requests.…”
Section: Selected Software Projectsmentioning
confidence: 99%
“…Additionally, some approaches allow developers to mitigate the significant effort issue, but they do not support code contribution analysis. 14,15 To reduce the discussed problems, we propose the Salvum policy language to support the specification of constraints that help to protect sensitive information from being inadvertently accessed by specific code contributions. For instance, Gitblit is a git repository manager that uses sensitive information such as password to its authentication mechanism.…”
Section: Introductionmentioning
confidence: 99%
“…Expressive structures, like automata, have previously been used to represent information flow specifications. Program dependence graphs [17,20], which represent data and flow dependencies between values specify allowable declassifications. And Rocha et al [31,32] employ policy graphs to specify sequences of functions that cause declassifications.…”
Section: Related Workmentioning
confidence: 99%
“…Query language approaches relate closely to the specification aspect of Saluki. Source-based approaches (e.g., by Yamaguchi et al [39,40], and tools such as PQL [26,28,29] and Pidgin [24] use taint-style patterns to find vulnerabilities. In general, binaries present unique challenges where we cannot exploit knowledge of source-level constructs (e.g., macros and objects).…”
Section: Related Workmentioning
confidence: 99%