25th USENIX Security Symposium has ended
Back To Schedule
Thursday, August 11 • 9:30am - 10:00am
APISan: Sanitizing API Usages through Semantic Cross-Checking

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

API misuse is a well-known source of bugs. Some of them (e.g., incorrect use of SSL API, and integer overflow of memory allocation size) can cause serious security vulnerabilities (e.g., man-in-the-middle (MITM) attack, and privilege escalation). Moreover, modern APIs, which are large, complex, and fast evolving, are error-prone. However, existing techniques to help finding bugs require manual effort by developers (e.g., providing specification or model) or are not scalable to large real-world software comprising millions of lines of code.

In this paper, we present APISAN, a tool that automatically infers correct API usages from source code without manual effort. The key idea in APISAN is to extract likely correct usage patterns in four different aspects (e.g., causal relation, and semantic relation on arguments) by considering semantic constraints. APISAN is tailored to check various properties with security implications. We applied APISAN to 92 million lines of code, including Linux Kernel, and OpenSSL, found 76 previously unknown bugs, and provided patches for all the bugs.


Yeongjin Jang

Georgia Institute of Technology

Taesoo Kim

Georgia Institute of Technology

Changwoo Min

Georgia Institute of Technology

Insu Yun

Georgia Tech

Thursday August 11, 2016 9:30am - 10:00am PDT
Zilker Ballroom 2

Attendees (6)