Abstract
This work introduces the concept of software sanitization locality and conducts empirical measurements. We define software sanitization locality as the property wherein the sanitization operation, if present, remains proximate to its protected API. To quantify this property, we have introduced a range of metrics to illustrate the distance between a sanitization operation and its protected API from various perspectives, including both the abstract syntax tree level and the binary level. In an effort to validate the concept of sanitization locality, we have also gathered and labeled a dataset of programs containing security patches to conduct empirical measurements. This dataset encompasses a diverse array of 16 typical vulner-abilities sourced from the Linux kernel codebase. The findings conclusively illustrate that the analyzed samples do exhibit the hypothesized sanitization locality.
Author supplied keywords
Cite
CITATION STYLE
Boland, N. C., Zhang, J., Chong, D., & Dai, R. (2024). An Empirical Study of Software Sanitization Locality. In Proceedings of the IEEE National Aerospace Electronics Conference, NAECON (pp. 1–6). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/NAECON61878.2024.10670650
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.