A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

[HTML][HTML] Static data flow analysis for android applications

S Arzt - 2017 - tuprints.ulb.tu-darmstadt.de
Mobile phones have become important daily companions for millions of people which help
to organize both their private and their professional lives. Having access to data such as the …

Tailoring taint analysis to GDPR

P Ferrara, L Olivieri, F Spoto - … and Policy: 6th Annual Privacy Forum, APF …, 2018 - Springer
Static analysis is the analysis of software at compile time without executing it. Its goal is to
explore all execution paths without needing specific inputs to drive the execution. Thanks to …

Leakdoctor: Toward automatically diagnosing privacy leaks in mobile applications

X Wang, A Continella, Y Yang, Y He… - Proceedings of the ACM on …, 2019 - dl.acm.org
With the enormous popularity of smartphones, millions of mobile apps are developed to
provide rich functionalities for users by accessing certain personal data, leading to great …

Static privacy analysis by flow reconstruction of tainted data

P Ferrara, L Olivieri, F Spoto - International Journal of Software …, 2021 - World Scientific
Software security vulnerabilities and leakages of private information are two of the main
issues in modern software systems. Several different approaches, ranging from design …

Annotation-based static analysis for personal data protection

K Hjerppe, J Ruohonen, V Leppänen - IFIP International Summer School …, 2019 - Springer
This paper elaborates the use of static source code analysis in the context of data protection.
The topic is important for software engineering in order for software developers to improve …

: Backward Context-Sensitive Flow Reconstruction of Taint Analysis Results

P Ferrara, L Olivieri, F Spoto - International Conference on Verification …, 2020 - Springer
Taint analysis detects if data coming from a source, such as user input, flows into a sink,
such as an SQL query, unsanitized (not properly escaped). Both static and dynamic taint …

Visual configuration of mobile privacy policies

A Aydin, D Piorkowski, O Tripp, P Ferrara… - … 2017, Held as Part of the …, 2017 - Springer
Mobile applications often require access to private user information, such as the user or
device ID, the location or the contact list. Usage of such data varies across different …

DAPA: degradation-aware privacy analysis of android apps

G Barbon, A Cortesi, P Ferrara… - International Workshop on …, 2016 - Springer
When installing or executing an app on a smartphone, we grant it access to part of our
(possibly confidential) data stored in the device. Traditional information-flow analyses aim to …

A solver for a theory of strings and bit-vectors

S Subramanian, M Berzish, O Tripp… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
We present the Z3strBV solver for a many-sorted first-order quantifier-free theory Tw, bv of
string equations, string length represented as bit-vectors, and bit-vector arithmetic aimed at …