Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

Control-flow integrity: Precision, security, and performance

N Burow, SA Carr, J Nash, P Larsen, M Franz… - ACM Computing …, 2017 - dl.acm.org
Memory corruption errors in C/C++ programs remain the most common source of security
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …

Soot: A Java bytecode optimization framework

R Vallée-Rai, P Co, E Gagnon, L Hendren… - CASCON First Decade …, 2010 - dl.acm.org
This paper presents Soot, a framework for optimizing Java* bytecode. The framework is
implemented in Java and supports three intermediate representations for representing Java …

An attack surface metric

PK Manadhata, JM Wing - IEEE Transactions on Software …, 2010 - ieeexplore.ieee.org
Measurement of software security is a long-standing challenge to the research community.
At the same time, practical security metrics and measurements are essential for secure …

Pointer analysis

Y Smaragdakis, G Balatsouras - Foundations and Trends® in …, 2015 - nowpublishers.com
Pointer analysis is a fundamental static program analysis, with a rich literature and wide
applications. The goal of pointer analysis is to compute an approximation of the set of …

Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts

Y Xue, M Ma, Y Lin, Y Sui, J Ye, T Peng - Proceedings of the 35th IEEE …, 2020 - dl.acm.org
Reentrancy bugs, one of the most severe vulnerabilities in smart contracts, have caused
huge financial loss in recent years. Researchers have proposed many approaches to …

Scaling Java Points-to Analysis Using Spark

O Lhoták, L Hendren - … : 12th International Conference, CC 2003 Held as …, 2003 - Springer
Most points-to analysis research has been done on different systems by different groups,
making it difficult to compare results, and to understand interactions between individual …

Parameterized object sensitivity for points-to analysis for Java

A Milanova, A Rountev, BG Ryder - ACM Transactions on Software …, 2005 - dl.acm.org
The goal of points-to analysis for Java is to determine the set of objects pointed to by a
reference variable or a reference object field. We present object sensitivity, a new form of …

Call graph construction in object-oriented languages

D Grove, G DeFouw, J Dean, C Chambers - Proceedings of the 12th …, 1997 - dl.acm.org
Interprocedural analyses enable optimizing compilers to more precisely model the effects of
non-inlined procedure calls, potentially resulting in substantial increases in application …

Regression test selection for Java software

MJ Harrold, JA Jones, T Li, D Liang, A Orso… - ACM Sigplan …, 2001 - dl.acm.org
Regression testing is applied to modified software to provide confidence that the changed
parts behave as intended and that the unchanged parts have not been adversely affected by …