Octopus: Scaling Value-Flow Analysis via Parallel Collection of Realizable Path Conditions

W Tang, D Dong, S Li, C Wang, P Yao, J Zhou… - ACM Transactions on …, 2024 - dl.acm.org
Value-flow analysis is a fundamental technique in program analysis, benefiting various
clients, such as memory corruption detection and taint analysis. However, existing efforts …

Finewave: fine-grained warning verification of bugs for automated static analysis tools

H Liu, J Zhang, C Zhang, X Zhang, K Li, S Chen… - arxiv preprint arxiv …, 2024 - arxiv.org
Automated Static Analysis Tools (ASATs) have evolved over time to assist in detecting bugs.
However, the excessive false warnings can impede developers' productivity and confidence …

Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and Enhancements

H Wang, Z Liu, Y Dai, S Wang, Q Tang, S Nie… - arxiv preprint arxiv …, 2024 - arxiv.org
Software composition analysis (SCA) denotes the process of identifying open-source
software components in an input software application. SCA has been extensively developed …

P-DATA: A Task-Level Parallel Framework for Dependency-Aware Value Flow Taint Analysis

R Xu, X Mao, L Chen - 2023 30th Asia-Pacific Software …, 2023 - ieeexplore.ieee.org
Taint analysis of value flows, as a static analysis technique, has gained widespread
application in the fields of software security and vulnerability mining. However, when dealing …

Boosting Path-Sensitive Value Flow Analysis via Removal of Redundant Summaries

Y Wang, Y Cai, C Zhang - arxiv preprint arxiv:2502.04952, 2025 - arxiv.org
Value flow analysis that tracks the flow of values via data dependence is a widely used
technique for detecting a broad spectrum of software bugs. However, the scalability issue …

Accelerating High-Precision Vulnerability Detection in C Programs with Parallel Graph Summarization

R Xu, X Mao, W **ao - 2023 6th International Conference on …, 2023 - ieeexplore.ieee.org
C language programs are often subject to memory vulnerabilities, posing substantial
security risks to software systems. Conventional detection techniques, rooted in static value …

Accelerating Static Null Pointer Dereference Detection with Parallel Computing

R Xu, L Chen, R Zhang, Y Zhang, W **ao… - Proceedings of the 15th …, 2024 - dl.acm.org
High-precision static analysis can effectively detect Null Pointer Dereference (NPD)
vulnerabilities in C language, but the performance overhead is significant. In recent years …

Robustifying Large-Scale Cloud Applications With Scalable Value-Flow Analysis

W Tang - 2024 - search.proquest.com
In the realm of cloud-native applications, ensuring robustness amidst the complexities of
distributed architectures presents a substantial challenge. The dynamic and interconnected …

Exploring Scalability of Value-Flow Graph Construction

R Xu, H Peng, K Yang, X Mao - Proceedings of the 2024 4th International …, 2024 - dl.acm.org
In modern software systems, the construction of Value-Flow Graphs (VFGs) is a critical step
for performing static analysis and vulnerability detection. However, traditional VFG …

[PDF][PDF] Enhancing Reliability and Performance of Data-centric Systems with Static Analysis

C Wang - 2023 - chengpeng-wang.github.io
In recent years, data-centric systems have gained significant popularity, particularly in
industrial production settings. These systems serve as the backbone of modern computing …