D2a: A dataset built for ai-based vulnerability detection methods using differential analysis

Y Zheng, S Pujar, B Lewis, L Buratti… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Static analysis tools are widely used for vulnerability detection as they understand programs
with complex behavior and millions of lines of code. Despite their popularity, static analysis …

25 million flows later: large-scale detection of DOM-based XSS

S Lekies, B Stock, M Johns - Proceedings of the 2013 ACM SIGSAC …, 2013 - dl.acm.org
In recent years, the Web witnessed a move towards sophis-ticated client-side functionality.
This shift caused a signifi-cant increase in complexity of deployed JavaScript code and thus …

JSFlow: Tracking information flow in JavaScript and its APIs

D Hedin, A Birgisson, L Bello, A Sabelfeld - Proceedings of the 29th …, 2014 - dl.acm.org
JavaScript drives the evolution of the web into a powerful application platform. Increasingly,
web applications combine services from different providers. The script inclusion mechanism …

Code injection attacks on html5-based mobile apps: Characterization, detection and mitigation

X **, X Hu, K Ying, W Du, H Yin, GN Peri - Proceedings of the 2014 …, 2014 - dl.acm.org
Due to the portability advantage, HTML5-based mobile apps are getting more and more
popular. Unfortunately, the web technology used by HTML5-based mobile apps has a …

Analysis of JavaScript programs: Challenges and research trends

K Sun, S Ryu - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
JavaScript has been a de facto standard language for client-side web programs, and now it
is expanding its territory to general purpose programs. In this article, we classify the client …

KJS: A complete formal semantics of JavaScript

D Park, A Stefănescu, G Roşu - Proceedings of the 36th ACM SIGPLAN …, 2015 - dl.acm.org
This paper presents KJS, the most complete and throughly tested formal semantics of
JavaScript to date. Being executable, KJS has been tested against the ECMAScript 5.1 …

Detecting node. js prototype pollution vulnerabilities via object lookup analysis

S Li, M Kang, J Hou, Y Cao - Proceedings of the 29th ACM Joint Meeting …, 2021 - dl.acm.org
Prototype pollution is a type of vulnerability specific to prototype-based languages, such as
JavaScript, which allows an adversary to pollute a base object's property, leading to a further …

Mining node. js vulnerabilities via object dependence graph and query

S Li, M Kang, J Hou, Y Cao - 31st USENIX Security Symposium …, 2022 - usenix.org
Node. js is a popular non-browser JavaScript platform that provides useful but sometimes
also vulnerable packages. On one hand, prior works have proposed many program analysis …

Andromeda: Accurate and Scalable Security Analysis of Web Applications

O Tripp, M Pistoia, P Cousot, R Cousot… - … 2013, Held as Part of the …, 2013 - Springer
Security auditing of industry-scale software systems mandates automation. Static taint
analysis enables deep and exhaustive tracking of suspicious data flows for detection of …

Efficient construction of approximate call graphs for JavaScript IDE services

A Feldthaus, M Schäfer, M Sridharan… - 2013 35th …, 2013 - ieeexplore.ieee.org
The rapid rise of JavaScript as one of the most popular programming languages of the
present day has led to a demand for sophisticated IDE support similar to what is available for …