Blogs (1) >>
ASE 2019
Sun 10 - Fri 15 November 2019 San Diego, California, United States

Machine image sniping is a difficult-to-detect security vulnerability in cloud computing code. When programmatically initializing a machine, a developer must specify which machine image (operating system and file system) to use as the basis for the new machine. The developer should restrict the search to only those machine images which their organization controls: otherwise, an attacker can insert a similar but malicious image into the public database, where it might be selected instead of the image intended by the developer when initializing a new machine. We present a lightweight type and effect system that detects requests to a cloud provider that are vulnerable to an image sniping attack, or proves that no vulnerable request exists in a codebase. We prototyped our type system for Java programs that request Amazon Web Services machines, and evaluated it on more than 500 codebases, detecting 12 vulnerable requests with only 3 false positives.

I’m a Ph.D. student at the University of Washington Paul G. Allen School of Computer Science & Engineering. I work in the PLSE group on lightweight software verification. My advisor is Mike Ernst.

My current work is focused on building type systems on top of the Checker Framework to solve practical problems in software engineering.

Tue 12 Nov

ase-2019-Student-Research-Competition
15:20 - 16:00: Student Research Competition - Poster Session: Student Research Competition at Kensington Ballroom
ase-2019-Student-Research-Competition15:20 - 16:00
Boosting Neural Commit Message Generation with Code Semantic Analysis
Shuyao JiangFudan University
ase-2019-Student-Research-Competition15:20 - 16:00
Toward Practical Automatic Program Repair
Ali GhanbariThe University of Texas at Dallas
ase-2019-Student-Research-Competition15:20 - 16:00
An Image-inspired and CNN-based Android Malware Detection Approach
Shao YangCase Western Reserve University
ase-2019-Student-Research-Competition15:20 - 16:00
An Approach for Investigating Emotion Dynamics in Software Development
Krishna NeupaneRochester Institute of Technology
ase-2019-Student-Research-Competition15:20 - 16:00
A Machine Learning based Approach to Identify SQL Injection Vulnerabilities
Kevin ZhangWayne State University
ase-2019-Student-Research-Competition15:20 - 16:00
Retrieve and Refine: Exemplar-based Neural Comment Generation
Bolin WeiPeking University
ase-2019-Student-Research-Competition15:20 - 16:00
Verifying Determinism in Sequential Programs
Rashmi MudduluruUniversity of Washington, Seattle
ase-2019-Student-Research-Competition15:20 - 16:00
User Preference Aware Multimedia Pricing Model using Game Theory and Prospect Theory for Wireless Communications
Krishna Murthy Kattiyan RamamoorthySan Diego State University
ase-2019-Student-Research-Competition15:20 - 16:00
Empirical Study of Python Call Graph
Li YuNanjing University
ase-2019-Student-Research-Competition15:20 - 16:00
Towards Comprehensible Representation of Controllers using Machine Learning
Gargi BalasubramaniamBirla Institute of Technology and Science, Pilani, K K Birla Goa Campus
ase-2019-Student-Research-Competition15:20 - 16:00
API Design Implications of Boilerplate Client Code
Daye NamCarnegie Mellon University
ase-2019-Student-Research-Competition15:20 - 16:00
Compile-time detection of machine image sniping
Martin KelloggUniversity of Washington, Seattle
ase-2019-Student-Research-Competition15:20 - 16:00
Crowdsourced Report Generation via Bug Screenshot Understanding
Shengcheng YuNanjing University, China

Wed 13 Nov

ase-2019-Student-Research-Competition
10:40 - 12:20: Student Research Competition - Student Research Competition - Selected Presentations (Graduate) at South Park
Chair(s): Jie M. ZhangUniversity College London, UK, Jin L.C. GuoMcGill University
ase-2019-Student-Research-Competition10:40 - 10:55
Toward Practical Automatic Program Repair
Ali GhanbariThe University of Texas at Dallas
ase-2019-Student-Research-Competition10:55 - 11:10
Verifying Determinism in Sequential Programs
Rashmi MudduluruUniversity of Washington, Seattle
ase-2019-Student-Research-Competition11:10 - 11:25
An Image-inspired and CNN-based Android Malware Detection Approach
Shao YangCase Western Reserve University
ase-2019-Student-Research-Competition11:25 - 11:40
User Preference Aware Multimedia Pricing Model using Game Theory and Prospect Theory for Wireless Communications
Krishna Murthy Kattiyan RamamoorthySan Diego State University
ase-2019-Student-Research-Competition11:40 - 11:55
API Design Implications of Boilerplate Client Code
Daye NamCarnegie Mellon University
ase-2019-Student-Research-Competition11:55 - 12:10
Compile-time detection of machine image sniping
Martin KelloggUniversity of Washington, Seattle