Challenges for static analysis of java reflection-literature review and empirical study
D Landman, A Serebrenik… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
The behavior of software that uses the Java Reflection API is fundamentally hard to predict
by analyzing code. Only recent static analysis approaches can resolve reflection under …
by analyzing code. Only recent static analysis approaches can resolve reflection under …
Smartcheck: Static analysis of ethereum smart contracts
Ethereum is a major blockchain-based platform for smart contracts-Turing complete
programs that are executed in a decentralized network and usually manipulate digital units …
programs that are executed in a decentralized network and usually manipulate digital units …
A survey of detection methods for XSS attacks
Cross-site scripting attack (abbreviated as XSS) is an unremitting problem for the Web
applications since the early 2000s. It is a code injection attack on the client-side where an …
applications since the early 2000s. It is a code injection attack on the client-side where an …
Iccta: Detecting inter-component privacy leaks in android apps
Shake Them All is a popular" Wallpaper" application exceeding millions of downloads on
Google Play. At installation, this application is given permission to (1) access the Internet (for …
Google Play. At installation, this application is given permission to (1) access the Internet (for …
[PDF][PDF] Information flow analysis of android applications in droidsafe.
We present DroidSafe, a static information flow analysis tool that reports potential leaks of
sensitive information in Android applications. DroidSafe combines a comprehensive …
sensitive information in Android applications. DroidSafe combines a comprehensive …
Chex: statically vetting android apps for component hijacking vulnerabilities
An enormous number of apps have been developed for Android in recent years, making it
one of the most popular mobile operating systems. However, the quality of the booming …
one of the most popular mobile operating systems. However, the quality of the booming …
Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale
C Gibler, J Crussell, J Erickson, H Chen - Trust and Trustworthy Computing …, 2012 - Springer
As mobile devices become more widespread and powerful, they store more sensitive data,
which includes not only users' personal information but also the data collected via sensors …
which includes not only users' personal information but also the data collected via sensors …
An empirical study of deep learning models for vulnerability detection
B Steenhoek, MM Rahman, R Jiles… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Deep learning (DL) models of code have recently reported great progress for vulnerability
detection. In some cases, DL-based models have outperformed static analysis tools …
detection. In some cases, DL-based models have outperformed static analysis tools …
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Android phones often carry personal information, attracting malicious developers to embed
code in Android applications to steal sensitive data. With known techniques in the literature …
code in Android applications to steal sensitive data. With known techniques in the literature …
[PDF][PDF] Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
Ethereum smart contracts are automated decentralized applications on the blockchain that
describe the terms of the agreement between buyers and sellers, reducing the need for …
describe the terms of the agreement between buyers and sellers, reducing the need for …