ECOOP 2025
Mon 30 June - Fri 4 July 2025 Bergen, Norway
Tue 1 Jul 2025 16:15 - 16:36 at Auditorium M003 - T3 Chair(s): Michael Vollmer

Functionality-specific vulnerabilities, as a common type of API vulnerabilities, are crucial for software developers to detect and avoid. When detecting functionality-specific vulnerabilities, the existing two categories of approaches are ineffective due to considering only the API bodies and disregarding diverse implementations of functionality-equivalent APIs. To effectively detect functionality-specific vulnerabilities, we propose APISS, the first approach to utilize API doc strings and signatures instead of API bodies. APISS first retrieves functionality-equivalent APIs for APIs with existing vulnerabilities and then migrates Proof-of-Concepts (PoCs) of the existing vulnerabilities for newly detected vulnerable APIs. % to detect functionality-equivalent APIs and then exploit new vulnerabilities among these APIs based on the PoCs of existing vulnerabilities. To retrieve functionality-equivalent APIs, we leverage a Large Language Model (LLM) for API embedding to improve the accuracy and address the effectiveness and scalability issues suffered by the existing approaches. To migrate PoCs of the existing vulnerabilities for newly detected vulnerable APIs, we design a semi-automatic schema to substantially reduce manual costs. We conduct a comprehensive evaluation to empirically compare APISS with four state-of-the-art (SOTA) approaches of detecting vulnerabilities and two SOTA approaches of retrieving functionality-equivalent APIs. The evaluation subjects include 180 widely used Java repositories using 10 existing vulnerabilities along with their PoCs. The results show that APISS effectively retrieves functionality-equivalent APIs, achieving a Top-1 Accuracy of 0.81 while the best of the baselines under comparison achieves only 0.55. APISS is highly efficient: the manual costs are within 10 minutes per vulnerability and the end-to-end runtime overhead of testing one candidate API is less than 2 hours. APISS detects 179 new vulnerabilities and receives 60 new CVE IDs, bringing high value to security practice.

Tue 1 Jul

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

16:15 - 17:39
T3Technical Papers at Auditorium M003
Chair(s): Michael Vollmer University of Kent
16:15
21m
Talk
Detecting Functionality-Specific Vulnerabilities via Retrieving Individual Functionality-Equivalent APIs in Open-Source Repositories
Technical Papers
Tianyu Chen Microsoft Research Asia, Zeyu Wang Huawei Cloud Computing Technologies Co., Ltd., Lin Li Huawei Cloud Computing Technologies Co., Ltd., Ding Li Peking University, Zongyang Li Peking University, Xiaoning Chang Huawei Cloud Computing Technologies Co., Ltd., Pan Bian Huawei Technologies CO., LTD., China, Guangtai Liang Huawei Cloud Computing Technologies, Qianxiang Wang Huawei Technologies Co., Ltd, Tao Xie Peking University
16:36
21m
Talk
Quantifying Cache Side-Channel Leakage by Refining Set-Based Abstractions
Technical Papers
Jacqueline Mitchell University of California, Davis, Chao Wang University of Southern California
16:57
21m
Talk
Scaling Up: Revisiting Mining Android Sandboxes at Scale for Malware Classification
Technical Papers
Francisco Costa University of Brasília, Brazil, Ismael Medeiros Computer Science Department / University of Brasília, Leandro Oliveira Computer Science Department / University of Brasília, João Clássio Computer Science Department / University of Brasília, Rodrigo Bonifácio UNB, Krishna Narasimhan F1RE, Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE, Márcio Ribeiro Federal University of Alagoas, Brazil
DOI Pre-print
17:18
21m
Talk
Ensuring Convergence and Invariants Without Coordination
Technical Papers
Dina Borrego NOVA LINCS, FCT, Universidade NOVA de Lisboa, Carla Ferreira NOVA University Lisbon, Elisa Gonzalez Boix Vrije Universiteit Brussel, Nuno Preguica Universidade Nova de Lisboa
:
:
:
: