Analysis of JavaScript programs: Challenges and research trends

K Sun, S Ryu - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
JavaScript has been a de facto standard language for client-side web programs, and now it
is expanding its territory to general purpose programs. In this article, we classify the client …

Typestate-guided fuzzer for discovering use-after-free vulnerabilities

H Wang, X **e, Y Li, C Wen, Y Li, Y Liu, S Qin… - Proceedings of the …, 2020 - dl.acm.org
Existing coverage-based fuzzers usually use the individual control flow graph (CFG) edge
coverage to guide the fuzzing process, which has shown great potential in finding …

Pycg: Practical call graph generation in python

V Salis, T Sotiropoulos, P Louridas… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Call graphs play an important role in different contexts, such as profiling and vulnerability
propagation analysis. Generating call graphs in an efficient manner can be a challenging …

Towards javascript program repair with generative pre-trained transformer (gpt-2)

M Lajkó, V Csuvik, L Vidács - … of the third international workshop on …, 2022 - dl.acm.org
The goal of Automated Program Repair (APR) is to find a fix to software bugs, without human
intervention. The so-called Generate and Validate (G&V) approach deemed to be the most …

Don't leak your keys: Understanding, measuring, and exploiting the appsecret leaks in mini-programs

Y Zhang, Y Yang, Z Lin - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Mobile mini-programs in WeChat have gained significant popularity since their debut in
2017, reaching a scale similar to that of Android apps in the Play Store. Like Google …

A survey of parametric static analysis

J Park, H Lee, S Ryu - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Understanding program behaviors is important to verify program properties or to optimize
programs. Static analysis is a widely used technique to approximate program behaviors via …

Mining node. js vulnerabilities via object dependence graph and query

S Li, M Kang, J Hou, Y Cao - 31st USENIX Security Symposium …, 2022 - usenix.org
Node. js is a popular non-browser JavaScript platform that provides useful but sometimes
also vulnerable packages. On one hand, prior works have proposed many program analysis …

Scaling javascript abstract interpretation to detect and exploit node. js taint-style vulnerability

M Kang, Y Xu, S Li, R Gjomemo, J Hou… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Taint-style vulnerabilities, such as OS command injection and path traversal, are common
and severe software weaknesses. There exists an inherent trade-off between analysis …

MiniTracker: Large-Scale Sensitive Information Tracking in Mini Apps

W Li, B Yang, H Ye, L **ang, Q Tao… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Running on host mobile applications, mini apps have gained increasing popularity these
days for its convenience in installation and usage. However, being easy to use allows mini …

A first look at the deprecation of RESTful APIs: An empirical study

J Yasmin, Y Tian, J Yang - 2020 IEEE International Conference …, 2020 - ieeexplore.ieee.org
REpresentational State Transfer (REST) is considered as one standard software
architectural style to build web APIs that can integrate software systems over the internet …