Small world with high risks: A study of security threats in the npm ecosystem

M Zimmermann, CA Staicu, C Tenny… - 28th USENIX Security …, 2019 - usenix.org
The popularity of JavaScript has lead to a large ecosystem of third-party packages available
via the npm software package registry. The open nature of npm has boosted its growth …

[PDF][PDF] CodeAlchemist: Semantics-aware code generation to find vulnerabilities in JavaScript engines.

HS Han, DH Oh, SK Cha - NDSS, 2019 - cseweb.ucsd.edu
JavaScript engines are an attractive target for attackers due to their popularity and flexibility
in building exploits. Current state-of-the-art fuzzers for finding JavaScript engine …

Silent spring: Prototype pollution leads to remote code execution in Node. js

M Shcherbakov, M Balliu, CA Staicu - 32nd USENIX Security Symposium …, 2023 - usenix.org
Prototype pollution is a dangerous vulnerability affecting prototype-based languages like
JavaScript and the Node. js platform. It refers to the ability of an attacker to inject properties …

Detecting node. js prototype pollution vulnerabilities via object lookup analysis

S Li, M Kang, J Hou, Y Cao - Proceedings of the 29th ACM Joint Meeting …, 2021 - dl.acm.org
Prototype pollution is a type of vulnerability specific to prototype-based languages, such as
JavaScript, which allows an adversary to pollute a base object's property, leading to a further …

Mining node. js vulnerabilities via object dependence graph and query

S Li, M Kang, J Hou, Y Cao - 31st USENIX Security Symposium …, 2022 - usenix.org
Node. js is a popular non-browser JavaScript platform that provides useful but sometimes
also vulnerable packages. On one hand, prior works have proposed many program analysis …

How many of all bugs do we find? a study of static bug detectors

A Habib, M Pradel - Proceedings of the 33rd ACM/IEEE International …, 2018 - dl.acm.org
Static bug detectors are becoming increasingly popular and are widely used by professional
software developers. While most work on bug detectors focuses on whether they find bugs at …

WaVe: a verifiably secure WebAssembly sandboxing runtime

E Johnson, E Laufer, Z Zhao, D Gohman… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The promise of software sandboxing is flexible, fast and portable isolation; capturing the
benefits of hardwarebased memory protection without requiring operating system …

{PolyCruise}: A {Cross-Language} dynamic information flow analysis

W Li, J Ming, X Luo, H Cai - 31st USENIX Security Symposium (USENIX …, 2022 - usenix.org
Despite the fact that most real-world software systems today are written in multiple
programming languages, existing program analysis based security techniques are still …

Neural bug finding: A study of opportunities and challenges

A Habib, M Pradel - arXiv preprint arXiv:1906.00307, 2019 - arxiv.org
Static analysis is one of the most widely adopted techniques to find software bugs before
code is put in production. Designing and implementing effective and efficient static analyses …

[PDF][PDF] Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.

ST Dinh, H Cho, K Martin, A Oest, K Zeng… - NDSS, 2021 - adamdoupe.com
JavaScript runtime systems include some specialized programming interfaces, called
binding layers. Binding layers translate data representations between JavaScript and unsafe …