The Spec# programming system: An overview

M Barnett, KRM Leino, W Schulte - … on Construction and Analysis of Safe …, 2004 - Springer
The Spec# programming system is a new attempt at a more cost effective way to develop
and maintain high-quality software. This paper describes the goals and architecture of the …

Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps

S Arzt, S Rasthofer, C Fritz, E Bodden, A Bartel… - ACM sigplan …, 2014 - dl.acm.org
Today's smartphones are a ubiquitous source of private and confidential data. At the same
time, smartphone users are plagued by carelessly programmed apps that leak important …

Precise interprocedural dataflow analysis via graph reachability

T Reps, S Horwitz, M Sagiv - Proceedings of the 22nd ACM SIGPLAN …, 1995 - dl.acm.org
The paper shows how a large class of interprocedural dataflow-analysis problems can be
solved precisely in polynomial time by transforming them into a special kind of graph …

Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps

F Wei, S Roy, X Ou, Robby - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
We present a new approach to static analysis for security vetting of Android apps and a
general framework called Amandroid. Amandroid determines points-to information for all …

Effective {Inter-Component} communication map** in android: An essential step towards holistic security analysis

D Octeau, P McDaniel, S Jha, A Bartel… - 22nd USENIX Security …, 2013 - usenix.org
Many threats present in smartphones are the result of interactions between application
components, not just artifacts of single components. However, current techniques for …

Automatically inspecting thousands of static bug warnings with large language model: How far are we?

C Wen, Y Cai, B Zhang, J Su, Z Xu, D Liu… - ACM Transactions on …, 2024 - dl.acm.org
Static analysis tools for capturing bugs and vulnerabilities in software programs are widely
employed in practice, as they have the unique advantages of high coverage and …

Program analysis via graph reachability

T Reps - Information and software technology, 1998 - Elsevier
This paper describes how a number of program-analysis problems can be solved by
transforming them to graph-reachability problems. Some of the program-analysis problems …

A lightweight symbolic virtual machine for solver-aided host languages

E Torlak, R Bodik - ACM SIGPLAN Notices, 2014 - dl.acm.org
Solver-aided domain-specific languages (SDSLs) are an emerging class of computer-aided
programming systems. They ease the construction of programs by using satisfiability solvers …

Composite constant propagation: Application to android inter-component communication analysis

D Octeau, D Luchaup, M Dering, S Jha… - 2015 IEEE/ACM 37th …, 2015 - ieeexplore.ieee.org
Many program analyses require statically inferring the possible values of composite types.
However, current approaches either do not account for correlations between object fields or …

[BOOK][B] Data flow analysis: theory and practice

U Khedker, A Sanyal, B Sathe - 2017 - taylorfrancis.com
Data flow analysis is used to discover information for a wide variety of useful applications,
ranging from compiler optimizations to software engineering and verification. Modern …