Control-flow integrity: Precision, security, and performance

N Burow, SA Carr, J Nash, P Larsen, M Franz… - ACM Computing …, 2017 - dl.acm.org
Memory corruption errors in C/C++ programs remain the most common source of security
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …

TAJ: effective taint analysis of web applications

O Tripp, M Pistoia, SJ Fink, M Sridharan… - ACM Sigplan …, 2009 - dl.acm.org
Taint analysis, a form of information-flow analysis, establishes whether values from
untrusted methods and parameters may flow into security-sensitive operations. Taint …

[ΒΙΒΛΙΟ][B] Data flow analysis: theory and practice

U Khedker, A Sanyal, B Sathe - 2017 - taylorfrancis.com
Data flow analysis is used to discover information for a wide variety of useful applications,
ranging from compiler optimizations to software engineering and verification. Modern …

Refinement-based context-sensitive points-to analysis for Java

M Sridharan, R Bodík - ACM SIGPLAN Notices, 2006 - dl.acm.org
We present a scalable and precise context-sensitive points-to analysis with three key
properties:(1) filtering out of unrealizable paths,(2) a context-sensitive heap abstraction, and …

Thin slicing

M Sridharan, SJ Fink, R Bodik - Proceedings of the 28th ACM SIGPLAN …, 2007 - dl.acm.org
Program slicing systematically identifies parts of a program relevant to a seed statement.
Unfortunately, slices of modern programs often grow too large for human consumption. We …

Andromeda: Accurate and Scalable Security Analysis of Web Applications

O Tripp, M Pistoia, P Cousot, R Cousot… - … 2013, Held as Part of the …, 2013 - Springer
Security auditing of industry-scale software systems mandates automation. Static taint
analysis enables deep and exhaustive tracking of suspicious data flows for detection of …

The decidability and complexity of interleaved bidirected Dyck reachability

AH Kjelstrøm, A Pavlogiannis - … of the ACM on Programming Languages, 2022 - dl.acm.org
Dyck reachability is the standard formulation of a large domain of static analyses, as it
achieves the sweet spot between precision and efficiency, and has thus been studied …

{In-Kernel}{Control-Flow} integrity on commodity {OSes} using {ARM} pointer authentication

S Yoo, J Park, S Kim, Y Kim, T Kim - 31st USENIX Security Symposium …, 2022 - usenix.org
This paper presents an in-kernel, hardware-based control-flow integrity (CFI) protection,
called PAL, that utilizes ARM's Pointer Authentication (PA). It provides three important …

Saving the world wide web from vulnerable JavaScript

S Guarnieri, M Pistoia, O Tripp, J Dolby… - Proceedings of the …, 2011 - dl.acm.org
JavaScript is the most popular client-side scripting language for Web applications.
Exploitable JavaScript code exposes end users to integrity and confidentiality violations …

Introspective analysis: context-sensitivity, across the board

Y Smaragdakis, G Kastrinis, G Balatsouras - Proceedings of the 35th …, 2014 - dl.acm.org
Context-sensitivity is the primary approach for adding more precision to a points-to analysis,
while hopefully also maintaining scalability. An oft-reported problem with context-sensitive …