[PDF][PDF] Information flow analysis of android applications in droidsafe.
We present DroidSafe, a static information flow analysis tool that reports potential leaks of
sensitive information in Android applications. DroidSafe combines a comprehensive …
sensitive information in Android applications. DroidSafe combines a comprehensive …
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
Virtualization is being widely adopted in today's computing systems. Its unique security
advantages in isolating and introspecting commodity OSes as virtual machines (VMs) have …
advantages in isolating and introspecting commodity OSes as virtual machines (VMs) have …
Strictly declarative specification of sophisticated points-to analyses
M Bravenboer, Y Smaragdakis - Proceedings of the 24th ACM SIGPLAN …, 2009 - dl.acm.org
We present the DOOP framework for points-to analysis of Java programs. DOOP builds on
the idea of specifying pointer analysis algorithms declaratively, using Datalog: a logic-based …
the idea of specifying pointer analysis algorithms declaratively, using Datalog: a logic-based …
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
This paper presents the first scalable context-sensitive, inclusion-based pointer alias
analysis for Java programs. Our approach to context sensitivity is to create a clone of a …
analysis for Java programs. Our approach to context sensitivity is to create a clone of a …
Effective static race detection for Java
We present a novel technique for static race detection in Java programs, comprised of a
series of stages that employ a combination of static analyses to successively reduce the …
series of stages that employ a combination of static analyses to successively reduce the …
Pointer analysis
Y Smaragdakis, G Balatsouras - Foundations and Trends® in …, 2015 - nowpublishers.com
Pointer analysis is a fundamental static program analysis, with a rich literature and wide
applications. The goal of pointer analysis is to compute an approximation of the set of …
applications. The goal of pointer analysis is to compute an approximation of the set of …
Heap abstractions for static analysis
V Kanvar, UP Khedker - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Heap data is potentially unbounded and seemingly arbitrary. Hence, unlike stack and static
data, heap data cannot be abstracted in terms of a fixed set of program variables. This …
data, heap data cannot be abstracted in terms of a fixed set of program variables. This …
Pycg: Practical call graph generation in python
V Salis, T Sotiropoulos, P Louridas… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Call graphs play an important role in different contexts, such as profiling and vulnerability
propagation analysis. Generating call graphs in an efficient manner can be a challenging …
propagation analysis. Generating call graphs in an efficient manner can be a challenging …
Parameterized object sensitivity for points-to analysis for Java
The goal of points-to analysis for Java is to determine the set of objects pointed to by a
reference variable or a reference object field. We present object sensitivity, a new form of …
reference variable or a reference object field. We present object sensitivity, a new form of …
Refinement-based context-sensitive points-to analysis for Java
M Sridharan, R Bodík - ACM SIGPLAN Notices, 2006 - dl.acm.org
We present a scalable and precise context-sensitive points-to analysis with three key
properties:(1) filtering out of unrealizable paths,(2) a context-sensitive heap abstraction, and …
properties:(1) filtering out of unrealizable paths,(2) a context-sensitive heap abstraction, and …