Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
Today's smartphones are a ubiquitous source of private and confidential data. At the same
time, smartphone users are plagued by carelessly programmed apps that leak important …
time, smartphone users are plagued by carelessly programmed apps that leak important …
Challenges for static analysis of java reflection-literature review and empirical study
D Landman, A Serebrenik… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
The behavior of software that uses the Java Reflection API is fundamentally hard to predict
by analyzing code. Only recent static analysis approaches can resolve reflection under …
by analyzing code. Only recent static analysis approaches can resolve reflection under …
[PDF][PDF] Information flow analysis of android applications in droidsafe.
We present DroidSafe, a static information flow analysis tool that reports potential leaks of
sensitive information in Android applications. DroidSafe combines a comprehensive …
sensitive information in Android applications. DroidSafe combines a comprehensive …
Input Validation Vulnerabilities in Web Applications: Systematic Review, Classification, and Analysis of the Current State-of-the-Art
FF Fadlalla, HT Elshoush - IEEE Access, 2023 - ieeexplore.ieee.org
In recent years, huge increase in attacks and data breaches is noticed. Most of the attacks
are performed and focused on the vulnerabilities related to web applications. Hence …
are performed and focused on the vulnerabilities related to web applications. Hence …
Andromeda: Accurate and Scalable Security Analysis of Web Applications
Security auditing of industry-scale software systems mandates automation. Static taint
analysis enables deep and exhaustive tracking of suspicious data flows for detection of …
analysis enables deep and exhaustive tracking of suspicious data flows for detection of …
The role of program analysis in security vulnerability detection: Then and now
Program analysis techniques play an important role in detecting security vulnerabilities. In
this paper we describe our experiences in develo** a variety of tools that detect security …
this paper we describe our experiences in develo** a variety of tools that detect security …
Stubdroid: automatic inference of precise data-flow summaries for the android framework
Smartphone users suffer from insufficient information on how commercial as well as
malicious apps handle sensitive data stored on their phones. Automated taint analyses …
malicious apps handle sensitive data stored on their phones. Automated taint analyses …
SymJS: automatic symbolic testing of JavaScript web applications
We present SymJS, a comprehensive framework for automatic testing of client-side
JavaScript Web applications. The tool contains a symbolic execution engine for JavaScript …
JavaScript Web applications. The tool contains a symbolic execution engine for JavaScript …
Alias analysis for object-oriented programs
We present a high-level survey of state-of-the-art alias analyses for object-oriented
programs, based on a years-long effort develo** industrial-strength static analyses for …
programs, based on a years-long effort develo** industrial-strength static analyses for …
Phosphor: Illuminating dynamic data flow in commodity jvms
Dynamic taint analysis is a well-known information flow analysis problem with many
possible applications. Taint tracking allows for analysis of application data flow by assigning …
possible applications. Taint tracking allows for analysis of application data flow by assigning …