Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

Beacon: Directed grey-box fuzzing with provable path pruning

H Huang, Y Guo, Q Shi, P Yao, R Wu… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Unlike coverage-based fuzzing that gives equal attention to every part of a code, directed
fuzzing aims to direct a fuzzer to a specific target in the code, eg, the code with potential …

Incorrectness logic

PW O'Hearn - Proceedings of the ACM on Programming Languages, 2019 - dl.acm.org
Program correctness and incorrectness are two sides of the same coin. As a programmer,
even if you would like to have correctness, you might find yourself spending most of your …

Heap abstractions for static analysis

V Kanvar, UP Khedker - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Heap data is potentially unbounded and seemingly arbitrary. Hence, unlike stack and static
data, heap data cannot be abstracted in terms of a fixed set of program variables. This …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

On-demand strong update analysis via value-flow refinement

Y Sui, J Xue - Proceedings of the 2016 24th ACM SIGSOFT …, 2016 - dl.acm.org
We present a new Strong UPdate Analysis for C programs, called Supa, that enables
computing points-to information on-demand via value-flow refinement, in environments with …

Striking a balance: pruning false-positives from static call graphs

A Utture, S Liu, CG Kalhauge, J Palsberg - Proceedings of the 44th …, 2022 - dl.acm.org
Researchers have reported that static analysis tools rarely achieve a false-positive rate that
would make them attractive to developers. We overcome this problem by a technique that …

SyzDirect: Directed Greybox Fuzzing for Linux Kernel

X Tan, Y Zhang, J Lu, X **ong, Z Liu… - Proceedings of the 2023 …, 2023 - dl.acm.org
Bug reports and patch commits are dramatically increasing for OS kernels, incentivizing a
critical need for kernel-level bug reproduction and patch testing. Directed greybox fuzzing …

Understanding and analyzing java reflection

Y Li, T Tan, J Xue - ACM Transactions on Software Engineering and …, 2019 - dl.acm.org
Java reflection has been widely used in a variety of applications and frameworks. It allows a
software system to inspect and change the behaviour of its classes, interfaces, methods, and …

Value-flow-based demand-driven pointer analysis for C and C++

Y Sui, J Xue - IEEE Transactions on Software Engineering, 2018 - ieeexplore.ieee.org
We present Supa, a value-flow-based demand-driven flow-and context-sensitive pointer
analysis with strong updates for C and C++ programs. Supa enables computing points-to …