Static analysis of android apps: A systematic literature review
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …
often traversing program paths to check some program properties. Static analysis …
Control-flow integrity: Precision, security, and performance
Memory corruption errors in C/C++ programs remain the most common source of security
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …
Soot: A Java bytecode optimization framework
R Vallée-Rai, P Co, E Gagnon, L Hendren… - CASCON First Decade …, 2010 - dl.acm.org
This paper presents Soot, a framework for optimizing Java* bytecode. The framework is
implemented in Java and supports three intermediate representations for representing Java …
implemented in Java and supports three intermediate representations for representing Java …
An attack surface metric
Measurement of software security is a long-standing challenge to the research community.
At the same time, practical security metrics and measurements are essential for secure …
At the same time, practical security metrics and measurements are essential for secure …
Pointer analysis
Pointer analysis is a fundamental static program analysis, with a rich literature and wide
applications. The goal of pointer analysis is to compute an approximation of the set of …
applications. The goal of pointer analysis is to compute an approximation of the set of …
Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts
Reentrancy bugs, one of the most severe vulnerabilities in smart contracts, have caused
huge financial loss in recent years. Researchers have proposed many approaches to …
huge financial loss in recent years. Researchers have proposed many approaches to …
Scaling Java Points-to Analysis Using Spark
O Lhoták, L Hendren - … : 12th International Conference, CC 2003 Held as …, 2003 - Springer
Most points-to analysis research has been done on different systems by different groups,
making it difficult to compare results, and to understand interactions between individual …
making it difficult to compare results, and to understand interactions between individual …
Parameterized object sensitivity for points-to analysis for Java
The goal of points-to analysis for Java is to determine the set of objects pointed to by a
reference variable or a reference object field. We present object sensitivity, a new form of …
reference variable or a reference object field. We present object sensitivity, a new form of …
Call graph construction in object-oriented languages
Interprocedural analyses enable optimizing compilers to more precisely model the effects of
non-inlined procedure calls, potentially resulting in substantial increases in application …
non-inlined procedure calls, potentially resulting in substantial increases in application …
Regression test selection for Java software
Regression testing is applied to modified software to provide confidence that the changed
parts behave as intended and that the unchanged parts have not been adversely affected by …
parts behave as intended and that the unchanged parts have not been adversely affected by …