[PDF][PDF] Information flow analysis of android applications in droidsafe.

MI Gordon, D Kim, JH Perkins, L Gilham, N Nguyen… - NDSS, 2015 - people.csail.mit.edu
We present DroidSafe, a static information flow analysis tool that reports potential leaks of
sensitive information in Android applications. DroidSafe combines a comprehensive …

[PDF][PDF] The Soot framework for Java program analysis: a retrospective

P Lam, E Bodden, O Lhoták… - Cetus Users and …, 2011 - pdfs.semanticscholar.org
You can write a compiler pass extending Soot, as either a BodyTransformer, for a
intraprocedural analysis; or SceneTransformer, for a whole-program analysis. You choose …

Effective static race detection for Java

M Naik, A Aiken, J Whaley - Proceedings of the 27th ACM SIGPLAN …, 2006 - dl.acm.org
We present a novel technique for static race detection in Java programs, comprised of a
series of stages that employ a combination of static analyses to successively reduce the …

Demand-driven points-to analysis for Java

M Sridharan, D Gopan, L Shan, R Bodík - ACM SIGPLAN Notices, 2005 - dl.acm.org
We present a points-to analysis technique suitable for environments with small time and
memory budgets, such as just-in-time (JIT) compilers and interactive development …

Points-to analysis using BDDs

M Berndl, O Lhoták, F Qian, L Hendren… - Proceedings of the ACM …, 2003 - dl.acm.org
This paper reports on a new approach to solving a subset-based points-to analysis for Java
using Binary Decision Diagrams (BDDs). In the model checking community, BDDs have …

Jred: Program customization and bloatware mitigation based on static analysis

Y Jiang, D Wu, P Liu - … IEEE 40th annual computer software and …, 2016 - ieeexplore.ieee.org
Modern software engineering practice increasingly brings redundant code into software
products, which has caused a phenomenon called bloatware, leading to software system …

Evaluating the benefits of context-sensitive points-to analysis using a BDD-based implementation

O Lhoták, L Hendren - ACM Transactions on Software Engineering and …, 2008 - dl.acm.org
We present Paddle, a framework of BDD-based context-sensitive points-to and call graph
analyses for Java, as well as client analyses that use their results. Paddle supports several …

A user-guided approach to program analysis

R Mangal, X Zhang, AV Nori, M Naik - … of the 2015 10th Joint Meeting on …, 2015 - dl.acm.org
Program analysis tools often produce undesirable output due to various approximations. We
present an approach and a system EUGENE that allows user feedback to guide such …

Enhancing malware detection for android apps: Detecting fine-granularity malicious components

Z Liu, LF Zhang, Y Tang - 2023 38th IEEE/ACM International …, 2023 - ieeexplore.ieee.org
Existing Android malware detection systems primarily concentrate on detecting malware
apps, leaving a gap in the research concerning the detection of malicious components in …

Bandwidth-adaptive partitioning for distributed execution optimization of mobile applications

J Niu, W Song, M Atiquzzaman - Journal of Network and Computer …, 2014 - Elsevier
Mobile applications are becoming increasingly ubiquitous and provide ever richer
functionality on mobile devices, while such applications drain increasingly more battery …