Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Softw 2021
DOI: 10.1145/3468264.3468542
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Node.js prototype pollution vulnerabilities via object lookup analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(29 citation statements)
references
References 41 publications
0
15
0
Order By: Relevance
“…First, in contrast to standard taint analysis, injection sinks cannot be identified syntactically as they require specialized data flow analysis that record accesses to object properties, as illustrated by the blue dotted line. The analysis should identify attacker-controlled inputs that allow to control the prototype object, followed by uses 2: Universal gadget in Node.js standard library of this prototype object as a receiver in a property assignment [31]. Second, the analysis should handle language constructs such as loops and model the JavaScript built-in functions, e.g., shift() to correctly propagate data flows.…”
Section: Overviewmentioning
confidence: 99%
See 4 more Smart Citations
“…First, in contrast to standard taint analysis, injection sinks cannot be identified syntactically as they require specialized data flow analysis that record accesses to object properties, as illustrated by the blue dotted line. The analysis should identify attacker-controlled inputs that allow to control the prototype object, followed by uses 2: Universal gadget in Node.js standard library of this prototype object as a receiver in a property assignment [31]. Second, the analysis should handle language constructs such as loops and model the JavaScript built-in functions, e.g., shift() to correctly propagate data flows.…”
Section: Overviewmentioning
confidence: 99%
“…Third, given the size of the targeted codebases, the analysis should be scalable, seeking the sweet spot between precision and recall. While prior work achieves high precision, it reports low recall, thus increasing the possibility to miss flaws in real applications [31,32]. These requirements lead us to our first research question: How to design and implement a scalable static analysis that effectively identifies prototype pollution in real-world libraries and applications?…”
Section: Overviewmentioning
confidence: 99%
See 3 more Smart Citations