Control-flow integrity: Precision, security, and performance
Memory corruption errors in C/C++ programs remain the most common source of security
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from
untrusted methods and parameters may flow into security-sensitive operations. Taint …
untrusted methods and parameters may flow into security-sensitive operations. Taint …
[ΒΙΒΛΙΟ][B] Data flow analysis: theory and practice
U Khedker, A Sanyal, B Sathe - 2017 - taylorfrancis.com
Data flow analysis is used to discover information for a wide variety of useful applications,
ranging from compiler optimizations to software engineering and verification. Modern …
ranging from compiler optimizations to software engineering and verification. Modern …
Refinement-based context-sensitive points-to analysis for Java
We present a scalable and precise context-sensitive points-to analysis with three key
properties:(1) filtering out of unrealizable paths,(2) a context-sensitive heap abstraction, and …
properties:(1) filtering out of unrealizable paths,(2) a context-sensitive heap abstraction, and …
Thin slicing
Program slicing systematically identifies parts of a program relevant to a seed statement.
Unfortunately, slices of modern programs often grow too large for human consumption. We …
Unfortunately, slices of modern programs often grow too large for human consumption. We …
Andromeda: Accurate and Scalable Security Analysis of Web Applications
Security auditing of industry-scale software systems mandates automation. Static taint
analysis enables deep and exhaustive tracking of suspicious data flows for detection of …
analysis enables deep and exhaustive tracking of suspicious data flows for detection of …
The decidability and complexity of interleaved bidirected Dyck reachability
Dyck reachability is the standard formulation of a large domain of static analyses, as it
achieves the sweet spot between precision and efficiency, and has thus been studied …
achieves the sweet spot between precision and efficiency, and has thus been studied …
{In-Kernel}{Control-Flow} integrity on commodity {OSes} using {ARM} pointer authentication
This paper presents an in-kernel, hardware-based control-flow integrity (CFI) protection,
called PAL, that utilizes ARM's Pointer Authentication (PA). It provides three important …
called PAL, that utilizes ARM's Pointer Authentication (PA). It provides three important …
Saving the world wide web from vulnerable JavaScript
JavaScript is the most popular client-side scripting language for Web applications.
Exploitable JavaScript code exposes end users to integrity and confidentiality violations …
Exploitable JavaScript code exposes end users to integrity and confidentiality violations …
Introspective analysis: context-sensitivity, across the board
Context-sensitivity is the primary approach for adding more precision to a points-to analysis,
while hopefully also maintaining scalability. An oft-reported problem with context-sensitive …
while hopefully also maintaining scalability. An oft-reported problem with context-sensitive …