Ryan Berg
IBM
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ryan Berg.
international symposium on software testing and analysis | 2011
Salvatore Guarnieri; Marco Pistoia; Omer Tripp; Julian Dolby; Stephen Darwin Teilhet; Ryan Berg
JavaScript is the most popular client-side scripting language for Web applications. Exploitable JavaScript code exposes end users to integrity and confidentiality violations. Client-side vulnerabilities can cost an enterprise money and reputation, and cause serious damage to innocent users of the Web application. In spite of all this, recent research in the area of information-flow security has focused more on other languages that are more suitable for server-side programming, such as Java. Static analysis of JavaScript code is very challenging due to the dynamic nature of the language. This paper presents Actarus, a novel, product-quality static taint analysis for JavaScript that scales to large programs and soundly models all the JavaScript constructs with the exception of reflective calls. This paper discusses the experimental results obtained by running Actarus on a collection of 9,726 Web pages obtained by crawling the 50 most visited Web sites worldwide as well as 19 other popular Web sites. The results expose 526 vulnerabilities in 11 sites. Those vulnerabilities, if exploited, can allow malicious JavaScript code execution.
conference on object-oriented programming systems, languages, and applications | 2011
Manu Sridharan; Shay Artzi; Marco Pistoia; Salvatore A. Guarnieri; Omer Tripp; Ryan Berg
This paper presents F4F (Framework For Frameworks), a system for effective taint analysis of framework-based web applications. Most modern web applications utilize one or more web frameworks, which provide useful abstractions for common functionality. Due to extensive use of reflective language constructs in framework implementations, existing static taint analyses are often ineffective when applied to framework-based applications. While previous work has included ad hoc support for certain framework constructs, adding support for a large number of frameworks in this manner does not scale from an engineering standpoint. F4F employs an initial analysis pass in which both application code and configuration files are processed to generate a specification of framework-related behaviors. A taint analysis engine can leverage these specifications to perform a much deeper, more precise analysis of framework-based applications. Our specification language has only a small number of simple but powerful constructs, easing analysis engine integration. With this architecture, new frameworks can be handled with no changes to the core analysis engine, yielding significant engineering benefits. We implemented specification generators for several web frameworks and added F4F support to a state-of-the-art taint-analysis engine. In an experimental evaluation, the taint analysis enhanced with F4F discovered 525 new issues across nine benchmarks, a harmonic mean of 2.10X more issues per benchmark. Furthermore, manual inspection of a subset of the new issues showed that many were exploitable or reflected bad security practice.
Archive | 2004
Ryan Berg; Larry Rose; John Peyton; John J. Danahy; Robert Gottlieb; Chris Rehbein
Archive | 2004
Ryan Berg; Larry Rose; John Peyton; John J. Danahy; Robert Gottlieb; Chris Rehbein
Archive | 2004
Ryan Berg; Larry Rose; John Peyton; John J. Danahy; Robert Gottlieb; Chris Rehbein
Archive | 2010
Shay Artzi; Ryan Berg; John Peyton; Marco Pistoia; Manu Sridharan; Robert Wiener
Archive | 2012
Ryan Berg; Paolina Centonze; Marco Pistoia; Omer Tripp
Archive | 2010
Shay Artzi; Ryan Berg; Yinnon A. Haviv; John Peyton; Marco Pistoia; Manu Sridharan; Babita Sharma; Omri Weisman; Robert Wiener
Archive | 2013
Ryan Berg; Marco Pistoia; Takaaki Tateishi; Stephen Darwin Teilhet; Omer Tripp
Archive | 2010
Ryan Berg; Marco Pistoia; Takaaki Tateishi; Omer Tripp