A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
[HTML][HTML] Static data flow analysis for android applications
S Arzt - 2017 - tuprints.ulb.tu-darmstadt.de
Mobile phones have become important daily companions for millions of people which help
to organize both their private and their professional lives. Having access to data such as the …
to organize both their private and their professional lives. Having access to data such as the …
Tailoring taint analysis to GDPR
Static analysis is the analysis of software at compile time without executing it. Its goal is to
explore all execution paths without needing specific inputs to drive the execution. Thanks to …
explore all execution paths without needing specific inputs to drive the execution. Thanks to …
Leakdoctor: Toward automatically diagnosing privacy leaks in mobile applications
With the enormous popularity of smartphones, millions of mobile apps are developed to
provide rich functionalities for users by accessing certain personal data, leading to great …
provide rich functionalities for users by accessing certain personal data, leading to great …
Static privacy analysis by flow reconstruction of tainted data
Software security vulnerabilities and leakages of private information are two of the main
issues in modern software systems. Several different approaches, ranging from design …
issues in modern software systems. Several different approaches, ranging from design …
Annotation-based static analysis for personal data protection
This paper elaborates the use of static source code analysis in the context of data protection.
The topic is important for software engineering in order for software developers to improve …
The topic is important for software engineering in order for software developers to improve …
: Backward Context-Sensitive Flow Reconstruction of Taint Analysis Results
Taint analysis detects if data coming from a source, such as user input, flows into a sink,
such as an SQL query, unsanitized (not properly escaped). Both static and dynamic taint …
such as an SQL query, unsanitized (not properly escaped). Both static and dynamic taint …
Visual configuration of mobile privacy policies
Mobile applications often require access to private user information, such as the user or
device ID, the location or the contact list. Usage of such data varies across different …
device ID, the location or the contact list. Usage of such data varies across different …
DAPA: degradation-aware privacy analysis of android apps
When installing or executing an app on a smartphone, we grant it access to part of our
(possibly confidential) data stored in the device. Traditional information-flow analyses aim to …
(possibly confidential) data stored in the device. Traditional information-flow analyses aim to …
A solver for a theory of strings and bit-vectors
We present the Z3strBV solver for a many-sorted first-order quantifier-free theory Tw, bv of
string equations, string length represented as bit-vectors, and bit-vector arithmetic aimed at …
string equations, string length represented as bit-vectors, and bit-vector arithmetic aimed at …