Logo Logo
Help
Contact
Switch Language to German

Wickert, Anna-Katharina ORCID logoORCID: https://orcid.org/0000-0002-1441-2423; Damke, Clemens ORCID logoORCID: https://orcid.org/0000-0002-0455-0048; Baumgärtner, Lars ORCID logoORCID: https://orcid.org/0000-0002-5805-2773; Hüllermeier, Eyke ORCID logoORCID: https://orcid.org/0000-0002-9944-4108 and Mezini, Mira ORCID logoORCID: https://orcid.org/0000-0001-6563-7537 (15. May 2023): UnGoML: Automated Classification of unsafe Usages in Go. 20th International Conference on Mining Software Repositories (MSR), Melbourne, Australia, 15-16 May, 2023. In: 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR), IEEE. pp. 309-321

Full text not available from 'Open Access LMU'.

Abstract

The Go programming language offers strong protection from memory corruption. As an escape hatch of these protections, it provides the unsafe package. Previous studies identified that this unsafe package is frequently used in real-world code for several purposes, e.g., serialization or casting types. Due to the variety of these reasons, it may be possible to refactor specific usages to avoid potential vulnerabilities. However, the classification of unsafe usages is challenging and requires the context of the call and the program’s structure. In this paper, we present the first automated classifier for unsafe usages in Go, UNGOML, to identify what is done with the unsafe package and why it is used. For UNGOML, we built four custom deep-learning classifiers trained on a manually labeled data set. We represent Go code as enriched control-flow graphs (CFGs) and solve the label prediction task with one single-vertex and three context-aware classifiers. All three context-aware classifiers achieve a top-1 accuracy of more than 86% for both dimensions, WHAT and WHY. Furthermore, in a set-valued conformal prediction setting, we achieve accuracies of more than 93% with mean label set sizes of 2 for both dimensions. Thus, UNGOML can be used to efficiently filter unsafe usages for use cases such as refactoring or a security audit.

Actions (login required)

View Item View Item