ICSE 2021 (series) / Technical Track / Containing Malicious Package Updates in npm with a Lightweight Permission System
Containing Malicious Package Updates in npm with a Lightweight Permission SystemTechnical Track
Thu 27 May 2021 20:50 - 21:10 at Blended Sessions Room 1 - 3.6.1. Security Vulnerabilities: Different Domains Chair(s): Davide Fucci
Fri 28 May 2021 08:50 - 09:10 at Blended Sessions Room 1 - 3.6.1. Security Vulnerabilities: Different Domains
Fri 28 May 2021 08:50 - 09:10 at Blended Sessions Room 1 - 3.6.1. Security Vulnerabilities: Different Domains
The large amount of third-party packages available in fast-moving software ecosystems, such as the Node.js/npm, enables attackers to compromise applications by pushing malicious updates to their package dependencies. Studying the npm repository, we observed that many packages perform only simple computations and do not need access to filesystem or network APIs. This offers the opportunity to enforce least-privilege design per package, protecting them from malicious updates. We discuss the design space and propose a lightweight permission system that protects Node.js/npm applications by enforcing package permissions at runtime. Our system makes a large number of packages much harder to be exploited, almost for free.
Thu 27 MayDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
Thu 27 May
Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
Fri 28 MayDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
Fri 28 May
Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:50 - 09:50 | |||
08:50 20mPaper | Containing Malicious Package Updates in npm with a Lightweight Permission SystemTechnical Track Technical Track Gabriel Ferreira Carnegie Mellon University, Limin Jia Carnegie Mellon University, Joshua Sunshine Carnegie Mellon University, Christian Kästner Carnegie Mellon University Pre-print Media Attached | ||
09:10 20mPaper | Too Quiet in the Library: An Empirical Study of Security Updates in Android Apps’ Native CodeTechnical Track Technical Track Sumaya Almanee University of California, Irvine, Arda Ünal University of California, Irvine, Mathias Payer EPFL, Joshua Garcia University of California, Irvine Link to publication DOI Pre-print Media Attached | ||
09:30 20mPaper | If It’s Not Secure, It Should Not Compile: Preventing DOM-Based XSS in Large-Scale Web Development with API HardeningTechnical Track Technical Track Pre-print Media Attached |