A survey of dynamic analysis and test generation for JavaScript

E Andreasen, L Gong, A Møller, M Pradel… - ACM Computing …, 2017 - dl.acm.org
JavaScript has become one of the most prevalent programming languages. Unfortunately,
some of the unique properties that contribute to this popularity also make JavaScript …

Person re-identification by deep learning attribute-complementary information

A Schumann, R Stiefelhagen - Proceedings of the IEEE …, 2017 - openaccess.thecvf.com
Automatic person re-identification (re-id) across camera boundaries is a challenging
problem. Approaches have to be robust against many factors which influence the visual …

Analysis of JavaScript programs: Challenges and research trends

K Sun, S Ryu - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
JavaScript has been a de facto standard language for client-side web programs, and now it
is expanding its territory to general purpose programs. In this article, we classify the client …

JSFlow: Tracking information flow in JavaScript and its APIs

D Hedin, A Birgisson, L Bello, A Sabelfeld - Proceedings of the 29th …, 2014 - dl.acm.org
JavaScript drives the evolution of the web into a powerful application platform. Increasingly,
web applications combine services from different providers. The script inclusion mechanism …

Multiple facets for dynamic information flow

TH Austin, C Flanagan - Proceedings of the 39th annual ACM SIGPLAN …, 2012 - dl.acm.org
JavaScript has become a central technology of the web, but it is also the source of many
security problems, including cross-site scripting attacks and malicious advertising code …

An empirical study of privacy-violating information flows in JavaScript web applications

D Jang, R Jhala, S Lerner, H Shacham - … of the 17th ACM conference on …, 2010 - dl.acm.org
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy
violating information flows. We present an empirical study of the prevalence of such flows on …

One size does not fit all: Uncovering and exploiting cross platform discrepant {APIs} in {WeChat}

C Wang, Y Zhang, Z Lin - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
The past few years have witnessed a boom of mobile super apps, which are the apps
offering multiple services such as e-commerce, e-learning, and e-government via miniapps …

Hulk: Eliciting malicious behavior in browser extensions

A Kapravelos, C Grier, N Chachra, C Kruegel… - 23rd USENIX Security …, 2014 - usenix.org
We present Hulk, a dynamic analysis system that detects malicious behavior in browser
extensions by monitoring their execution and corresponding network activity. Hulk elicits …

Vetting browser extensions for security vulnerabilities with vex

S Bandhakavi, N Tiku, W Pittman, ST King… - Communications of the …, 2011 - dl.acm.org
The browser has become the de facto platform for everyday computation and a popular
target for attackers of computer systems. Among the many potential attacks that target or …

Mystique: Uncovering information leakage from browser extensions

Q Chen, A Kapravelos - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Browser extensions are small JavaScript, CSS and HTML programs that run inside the
browser with special privileges. These programs, often written by third parties, operate on …