Designing Robust API Monitoring Solutions

05/01/2020
by   Daniele Cono D'Elia, et al.
0

Tracing the sequence of library and system calls that a program makes is very helpful in the characterization of its interactions with the surrounding environment and ultimately of its semantics. Due to entanglements of real-world software stacks, accomplishing this task can be surprisingly challenging as we take accuracy, reliability, and transparency into the equation. To manage these dimensions effectively, we identify six challenges that API monitoring solutions should overcome and outline actionable design points for them, reporting insights from our experience in building API tracers for software security research. We detail two implementation variants, based on hardware-assisted virtualization (realizing the first general-purpose user-space tracer of this kind) and on dynamic binary translation, that achieve API monitoring robustly. We share our SNIPER system as open source.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/15/2021

Recommending API Function Calls and Code Snippets to Support Software Development

Software development activity has reached a high degree of complexity, g...
research
06/08/2021

zbMATH Open: API Solutions and Research Challenges

We present zbMATH Open, the most comprehensive collection of reviews and...
research
01/25/2008

Increased security through open source

In this paper we discuss the impact of open source on both the security ...
research
08/31/2018

Wasabi: A Framework for Dynamically Analyzing WebAssembly

WebAssembly is the new low-level language for the web and has now been i...
research
06/18/2020

Identification of Practices and Capabilities in API Management: A Systematic Literature Review

Traditional organizations are increasingly becoming software producing o...
research
02/27/2023

Formal Analysis of the API Proxy Problem

Implementing a security mechanism on top of APIs requires clear understa...
research
06/04/2023

Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling

With crypto-ransomware's unprecedented scope of impact and evolving leve...

Please sign up or login with your details

Forgot password? Click here to reset