2017 IEEE Symposium on Security and Privacy (SP) 2017
DOI: 10.1109/sp.2017.68
|View full text |Cite
|
Sign up to set email alerts
|

Finding and Preventing Bugs in JavaScript Bindings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(25 citation statements)
references
References 31 publications
0
25
0
Order By: Relevance
“…We leave it as future work to extend our algorithm to test compilers of other programming languages. We also believe we can apply our technique to find bugs in JS bindings [5], which input is allowed to contain JS code snippets, such as Node.js and PDF readers.…”
Section: Discussionmentioning
confidence: 99%
“…We leave it as future work to extend our algorithm to test compilers of other programming languages. We also believe we can apply our technique to find bugs in JS bindings [5], which input is allowed to contain JS code snippets, such as Node.js and PDF readers.…”
Section: Discussionmentioning
confidence: 99%
“…PyArg_ParseTuple is a helper C function from the Python API converting the Python arguments wrapped in the tuple into C values. 4 It uses a format string to describe the conversion. The | character separates mandatory arguments from the optional ones, while i signals a conversion from a Python integer to a C int.…”
Section: Counter Creationmentioning
confidence: 99%
“…Two works [26,28] aim at detecting reference counting errors in C code using the CPython API. Brown et al [4] define specialized analyses for specific patterns of C++ interoperability that may jeopardize type or memory safety of JavaScript. Contrary to these works, we analyze both host and guest languages.…”
Section: Related Workmentioning
confidence: 99%
“…The example shows benign inputs passed to a module that suffers from a known vulnerability. 6 Taser infers the following additional sink for the vulnerable module:…”
Section: Comparison With Coarse-grained Warningsmentioning
confidence: 99%