Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps

S Arzt, S Rasthofer, C Fritz, E Bodden, A Bartel… - ACM sigplan …, 2014 - dl.acm.org
Today's smartphones are a ubiquitous source of private and confidential data. At the same
time, smartphone users are plagued by carelessly programmed apps that leak important …

Challenges for static analysis of java reflection-literature review and empirical study

D Landman, A Serebrenik… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
The behavior of software that uses the Java Reflection API is fundamentally hard to predict
by analyzing code. Only recent static analysis approaches can resolve reflection under …

[PDF][PDF] Information flow analysis of android applications in droidsafe.

MI Gordon, D Kim, JH Perkins, L Gilham, N Nguyen… - NDSS, 2015 - people.csail.mit.edu
We present DroidSafe, a static information flow analysis tool that reports potential leaks of
sensitive information in Android applications. DroidSafe combines a comprehensive …

Input Validation Vulnerabilities in Web Applications: Systematic Review, Classification, and Analysis of the Current State-of-the-Art

FF Fadlalla, HT Elshoush - IEEE Access, 2023 - ieeexplore.ieee.org
In recent years, huge increase in attacks and data breaches is noticed. Most of the attacks
are performed and focused on the vulnerabilities related to web applications. Hence …

Andromeda: Accurate and Scalable Security Analysis of Web Applications

O Tripp, M Pistoia, P Cousot, R Cousot… - … 2013, Held as Part of the …, 2013 - Springer
Security auditing of industry-scale software systems mandates automation. Static taint
analysis enables deep and exhaustive tracking of suspicious data flows for detection of …

The role of program analysis in security vulnerability detection: Then and now

C Cifuentes, F Gauthier, B Hassanshahi, P Krishnan… - Computers & …, 2023 - Elsevier
Program analysis techniques play an important role in detecting security vulnerabilities. In
this paper we describe our experiences in develo** a variety of tools that detect security …

Stubdroid: automatic inference of precise data-flow summaries for the android framework

S Arzt, E Bodden - Proceedings of the 38th International Conference on …, 2016 - dl.acm.org
Smartphone users suffer from insufficient information on how commercial as well as
malicious apps handle sensitive data stored on their phones. Automated taint analyses …

SymJS: automatic symbolic testing of JavaScript web applications

G Li, E Andreasen, I Ghosh - Proceedings of the 22nd ACM SIGSOFT …, 2014 - dl.acm.org
We present SymJS, a comprehensive framework for automatic testing of client-side
JavaScript Web applications. The tool contains a symbolic execution engine for JavaScript …

Alias analysis for object-oriented programs

M Sridharan, S Chandra, J Dolby, SJ Fink… - Aliasing in Object …, 2013 - Springer
We present a high-level survey of state-of-the-art alias analyses for object-oriented
programs, based on a years-long effort develo** industrial-strength static analyses for …

Phosphor: Illuminating dynamic data flow in commodity jvms

J Bell, G Kaiser - ACM Sigplan Notices, 2014 - dl.acm.org
Dynamic taint analysis is a well-known information flow analysis problem with many
possible applications. Taint tracking allows for analysis of application data flow by assigning …