Skip to main content

Showing 1–9 of 9 results for author: Balliu, M

.
  1. arXiv:2312.10441  [pdf, ps, other

    cs.CR

    Disjunctive Policies for Database-Backed Programs

    Authors: Amir M. Ahmadian, Matvey Soloviev, Musard Balliu

    Abstract: When specifying security policies for databases, it is often natural to formulate disjunctive dependencies, where a piece of information may depend on at most one of two dependencies P1 or P2, but not both. A formal semantic model of such disjunctive dependencies, the Quantale of Information, was recently introduced by Hunt and Sands as a generalization of the Lattice of Information. In this paper… ▽ More

    Submitted 26 April, 2024; v1 submitted 16 December, 2023; originally announced December 2023.

    Comments: 21 pages, including references and appendix. Extended version of paper accepted to CSF 2024

  2. arXiv:2311.03919  [pdf, other

    cs.CR cs.PL

    Unveiling the Invisible: Detection and Evaluation of Prototype Pollution Gadgets with Dynamic Taint Analysis

    Authors: Mikhail Shcherbakov, Paul Moosbrugger, Musard Balliu

    Abstract: For better or worse, JavaScript is the cornerstone of modern Web. Prototype-based languages like JavaScript are susceptible to prototype pollution vulnerabilities, enabling an attacker to inject arbitrary properties into an object's prototype. The attacker can subsequently capitalize on the injected properties by executing otherwise benign pieces of code, so-called gadgets, that perform security-s… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  3. arXiv:2309.09542  [pdf, ps, other

    cs.CR cs.LO cs.MA

    Security Properties through the Lens of Modal Logic

    Authors: Matvey Soloviev, Musard Balliu, Roberto Guanciale

    Abstract: We introduce a framework for reasoning about the security of computer systems using modal logic. This framework is sufficiently expressive to capture a variety of known security properties, while also being intuitive and independent of syntactic details and enforcement mechanisms. We show how to use our formalism to represent various progress- and termination-(in)sensitive variants of confidential… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

    Comments: 19 pages, including references and appendix. Extended version of paper accepted to CSF 2024

    MSC Class: 68Q60 ACM Class: D.4.6; I.2.4

  4. Challenges of Producing Software Bill Of Materials for Java

    Authors: Musard Balliu, Benoit Baudry, Sofia Bobadilla, Mathias Ekstedt, Martin Monperrus, Javier Ron, Aman Sharma, Gabriel Skoglund, César Soto-Valero, Martin Wittlinger

    Abstract: Software bills of materials (SBOM) promise to become the backbone of software supply chain hardening. We deep-dive into 6 tools and the accuracy of the SBOMs they produce for complex open-source Java projects. Our novel insights reveal some hard challenges for the accurate production and usage of SBOMs.

    Submitted 7 June, 2023; v1 submitted 20 March, 2023; originally announced March 2023.

    Journal ref: IEEE Security & Privacy, 2023

  5. arXiv:2207.11171  [pdf, other

    cs.CR cs.PL

    Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js

    Authors: Mikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu

    Abstract: Prototype pollution is a dangerous vulnerability affecting prototype-based languages like JavaScript and the Node.js platform. It refers to the ability of an attacker to inject properties into an object's root prototype at runtime and subsequently trigger the execution of legitimate code gadgets that access these properties on the object's prototype, leading to attacks such as Denial of Service (D… ▽ More

    Submitted 10 November, 2022; v1 submitted 22 July, 2022; originally announced July 2022.

    Comments: USENIX Security'23

  6. arXiv:2109.01386  [pdf, ps, other

    cs.CR cs.PL cs.SC

    Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly

    Authors: Rodothea Myrsini Tsoupidi, Musard Balliu, Benoit Baudry

    Abstract: This paper explores the use of relational symbolic execution to counter timing side channels in WebAssembly programs. We design and implement Vivienne, an open-source tool to automatically analyze WebAssembly cryptographic libraries for constant-time violations. Our approach features various optimizations that leverage the structure of WebAssembly and automated theorem provers, including support f… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.

  7. arXiv:1911.00868  [pdf, ps, other

    cs.CR

    InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis

    Authors: Roberto Guanciale, Musard Balliu, Mads Dam

    Abstract: The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarchitecture. The attacks use features like pipelining, out-of-order and speculation to extract arbitrary information about the memory contents of a process. A comprehensive formal microarchitectural model capable of representing the forms of out-of-order and speculative behavior that can meaningfully b… ▽ More

    Submitted 17 August, 2020; v1 submitted 3 November, 2019; originally announced November 2019.

  8. arXiv:1906.11507  [pdf, other

    cs.CR

    An Empirical Study of Information Flows in Real-World JavaScript

    Authors: Cristian-Alexandru Staicu, Daniel Schoepe, Musard Balliu, Michael Pradel, Andrei Sabelfeld

    Abstract: Information flow analysis prevents secret or untrusted data from flowing into public or trusted sinks. Existing mechanisms cover a wide array of options, ranging from lightweight taint analysis to heavyweight information flow control that also considers implicit flows. Dynamic analysis, which is particularly popular for languages such as JavaScript, faces the question whether to invest in analyzin… ▽ More

    Submitted 27 June, 2019; originally announced June 2019.

  9. arXiv:1208.6106  [pdf, other

    cs.CR cs.LO cs.MA

    Epistemic Temporal Logic for Information Flow Security

    Authors: Musard Balliu, Mads Dam, Gurvan Le Guernic

    Abstract: Temporal epistemic logic is a well-established framework for expressing agents knowledge and how it evolves over time. Within language-based security these are central issues, for instance in the context of declassification. We propose to bring these two areas together. The paper presents a computational model and an epistemic temporal logic used to reason about knowledge acquired by observing pro… ▽ More

    Submitted 30 August, 2012; originally announced August 2012.

    Comments: Published in PLAS 2011