D2a: A dataset built for ai-based vulnerability detection methods using differential analysis
Static analysis tools are widely used for vulnerability detection as they understand programs
with complex behavior and millions of lines of code. Despite their popularity, static analysis …
with complex behavior and millions of lines of code. Despite their popularity, static analysis …
25 million flows later: large-scale detection of DOM-based XSS
In recent years, the Web witnessed a move towards sophis-ticated client-side functionality.
This shift caused a signifi-cant increase in complexity of deployed JavaScript code and thus …
This shift caused a signifi-cant increase in complexity of deployed JavaScript code and thus …
JSFlow: Tracking information flow in JavaScript and its APIs
JavaScript drives the evolution of the web into a powerful application platform. Increasingly,
web applications combine services from different providers. The script inclusion mechanism …
web applications combine services from different providers. The script inclusion mechanism …
Code injection attacks on html5-based mobile apps: Characterization, detection and mitigation
Due to the portability advantage, HTML5-based mobile apps are getting more and more
popular. Unfortunately, the web technology used by HTML5-based mobile apps has a …
popular. Unfortunately, the web technology used by HTML5-based mobile apps has a …
Analysis of JavaScript programs: Challenges and research trends
K Sun, S Ryu - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
JavaScript has been a de facto standard language for client-side web programs, and now it
is expanding its territory to general purpose programs. In this article, we classify the client …
is expanding its territory to general purpose programs. In this article, we classify the client …
KJS: A complete formal semantics of JavaScript
D Park, A Stefănescu, G Roşu - Proceedings of the 36th ACM SIGPLAN …, 2015 - dl.acm.org
This paper presents KJS, the most complete and throughly tested formal semantics of
JavaScript to date. Being executable, KJS has been tested against the ECMAScript 5.1 …
JavaScript to date. Being executable, KJS has been tested against the ECMAScript 5.1 …
Detecting node. js prototype pollution vulnerabilities via object lookup analysis
Prototype pollution is a type of vulnerability specific to prototype-based languages, such as
JavaScript, which allows an adversary to pollute a base object's property, leading to a further …
JavaScript, which allows an adversary to pollute a base object's property, leading to a further …
Mining node. js vulnerabilities via object dependence graph and query
Node. js is a popular non-browser JavaScript platform that provides useful but sometimes
also vulnerable packages. On one hand, prior works have proposed many program analysis …
also vulnerable packages. On one hand, prior works have proposed many program analysis …
Andromeda: Accurate and Scalable Security Analysis of Web Applications
Security auditing of industry-scale software systems mandates automation. Static taint
analysis enables deep and exhaustive tracking of suspicious data flows for detection of …
analysis enables deep and exhaustive tracking of suspicious data flows for detection of …
Efficient construction of approximate call graphs for JavaScript IDE services
The rapid rise of JavaScript as one of the most popular programming languages of the
present day has led to a demand for sophisticated IDE support similar to what is available for …
present day has led to a demand for sophisticated IDE support similar to what is available for …