Automatic Repair of Java']Java Code with Timing Side-Channel Vulnerabilities

被引:3
|
作者
Lima, Rui [1 ,2 ]
Ferreira, Joao F. [1 ,2 ]
Mendes, Alexandra [3 ,4 ]
机构
[1] Univ Lisbon, INESC ID, Lisbon, Portugal
[2] Univ Lisbon, IST, Lisbon, Portugal
[3] INESC TEC, Porto, Portugal
[4] Univ Beira Interior, Covilha, Portugal
关键词
Source Code Refactoring; Timing Side-Channel Vulnerabilities; Automatic Repair of Vulnerabilities; Code Repair; Security; !text type='Java']Java[!/text;
D O I
10.1109/ASEW52652.2021.00014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vulnerability detection and repair is a demanding and expensive part of the software development process. As such, there has been an effort to develop new and better ways to automatically detect and repair vulnerabilities. DifFuzz is a state-of-the-art tool for automatic detection of timing side-channel vulnerabilities, a type of vulnerability that is particularly difficult to detect and correct. Despite recent progress made with tools such as DifFuzz, work on tools capable of automatically repairing timing side-channel vulnerabilities is scarce. In this paper, we propose DifFuzzAR, a new tool for automatic repair of timing side-channel vulnerabilities in Java code. The tool works in conjunction with DifFuzz and it is able to repair 56% of the vulnerabilities identified in DifFuzz's dataset. The results show that the tool can indeed automatically correct timing side-channel vulnerabilities, being more effective with those that are controlflow based.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [1] DifFuzzAR: automatic repair of timing side-channel vulnerabilities via refactoring
    Rui Lima
    João F. Ferreira
    Alexandra Mendes
    Carolina Carreira
    Automated Software Engineering, 2024, 31
  • [2] DifFuzzAR: automatic repair of timing side-channel vulnerabilities via refactoring
    Lima, Rui
    Ferreira, Joao F.
    Mendes, Alexandra
    Carreira, Carolina
    AUTOMATED SOFTWARE ENGINEERING, 2024, 31 (01)
  • [3] A Study of Timing Side-Channel Attacks and Countermeasures on Java']JavaScript and WebAssembly
    Mazaheri, Mohammad Erfan
    Sarmadi, Siavash Bayat
    Ardakani, Farhad Taheri
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 14 (01): : 1 - 20
  • [4] Java']JavaScript Zero: Real Java']JavaScript and Zero Side-Channel Attacks
    Schwarz, Michael
    Lipp, Moritz
    Gruss, Daniel
    25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
  • [5] Automatic assessment of Java']Java code
    Insa, David
    Silva, Josep
    COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2018, 53 : 59 - 72
  • [6] Statically scanning Java']Java Code: Finding security vulnerabilities
    Viega, J
    McGraw, G
    Mutdosch, T
    Felten, EW
    IEEE SOFTWARE, 2000, 17 (05) : 68 - +
  • [7] Automatic Annotation of Confidential Data in Java']Java Code
    Bastys, Iulia
    Bolignano, Pauline
    Raimondi, Franco
    Schoepe, Daniel
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 146 - 161
  • [8] Refactoring Java']Java Code for Automatic API Generation
    Liu, Genggeng
    Hu, Chuanshumin
    Chen, Shihong
    Zhang, Ying
    Chen, Xing
    2018 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, BIG DATA AND BLOCKCHAIN (ICCBB 2018), 2018, : 114 - 119
  • [9] Timing Side-Channel Mitigation via Automated Program Repair
    Ruan, Haifeng
    Noller, Yannic
    Tizpaz-Niari, Saeid
    Chattopadhyay, Sudipta
    Roychoudhury, Abhik
    ACM Transactions on Software Engineering and Methodology, 2024, 33 (08)
  • [10] Eliminating Timing Side-Channel Leaks using Program Repair
    Wu, Meng
    Guo, Shengjian
    Schaumont, Patrick
    Wang, Chao
    ISSTA'18: PROCEEDINGS OF THE 27TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, 2018, : 15 - 26