[PDF][PDF] Information flow analysis of android applications in droidsafe.

MI Gordon, D Kim, JH Perkins, L Gilham, N Nguyen… - NDSS, 2015 - people.csail.mit.edu
We present DroidSafe, a static information flow analysis tool that reports potential leaks of
sensitive information in Android applications. DroidSafe combines a comprehensive …

Datalog and recursive query processing

TJ Green, SS Huang, BT Loo… - Foundations and Trends …, 2013 - nowpublishers.com
In recent years, we have witnessed a revival of the use of recursive queries in a variety of
emerging application domains such as data integration and exchange, information …

[PDF][PDF] The Soot framework for Java program analysis: a retrospective

P Lam, E Bodden, O Lhoták… - Cetus Users and …, 2011 - pdfs.semanticscholar.org
You can write a compiler pass extending Soot, as either a BodyTransformer, for a
intraprocedural analysis; or SceneTransformer, for a whole-program analysis. You choose …

Strictly declarative specification of sophisticated points-to analyses

M Bravenboer, Y Smaragdakis - Proceedings of the 24th ACM SIGPLAN …, 2009 - dl.acm.org
We present the DOOP framework for points-to analysis of Java programs. DOOP builds on
the idea of specifying pointer analysis algorithms declaratively, using Datalog: a logic-based …

Pointer analysis

Y Smaragdakis, G Balatsouras - Foundations and Trends® in …, 2015 - nowpublishers.com
Pointer analysis is a fundamental static program analysis, with a rich literature and wide
applications. The goal of pointer analysis is to compute an approximation of the set of …

Pick your contexts well: understanding object-sensitivity

Y Smaragdakis, M Bravenboer, O Lhoták - Proceedings of the 38th …, 2011 - dl.acm.org
Object-sensitivity has emerged as an excellent context abstraction for points-to analysis in
object-oriented languages. Despite its practical success, however, object-sensitivity is poorly …

Refinement-based context-sensitive points-to analysis for Java

M Sridharan, R Bodík - ACM SIGPLAN Notices, 2006 - dl.acm.org
We present a scalable and precise context-sensitive points-to analysis with three key
properties:(1) filtering out of unrealizable paths,(2) a context-sensitive heap abstraction, and …

Hybrid context-sensitivity for points-to analysis

G Kastrinis, Y Smaragdakis - ACM SIGPLAN Notices, 2013 - dl.acm.org
Context-sensitive points-to analysis is valuable for achieving high precision with good
performance. The standard flavors of context-sensitivity are call-site-sensitivity (kCFA) and …

Context-sensitive points-to analysis: is it worth it?

O Lhoták, L Hendren - International Conference on Compiler Construction, 2006 - Springer
We present the results of an empirical study evaluating the precision of subset-based points-
to analysis with several variations of context sensitivity on Java benchmarks of significant …

P/taint: Unified points-to and taint analysis

N Grech, Y Smaragdakis - Proceedings of the ACM on Programming …, 2017 - dl.acm.org
Static information-flow analysis (especially taint-analysis) is a key technique in software
security, computing where sensitive or untrusted data can propagate in a program. Points-to …