[PDF][PDF] Information flow analysis of android applications in droidsafe.

MI Gordon, D Kim, JH Perkins, L Gilham, N Nguyen… - NDSS, 2015 - people.csail.mit.edu
We present DroidSafe, a static information flow analysis tool that reports potential leaks of
sensitive information in Android applications. DroidSafe combines a comprehensive …

Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity

Z Wang, X Jiang - 2010 IEEE symposium on security and …, 2010 - ieeexplore.ieee.org
Virtualization is being widely adopted in today's computing systems. Its unique security
advantages in isolating and introspecting commodity OSes as virtual machines (VMs) have …

Strictly declarative specification of sophisticated points-to analyses

M Bravenboer, Y Smaragdakis - Proceedings of the 24th ACM SIGPLAN …, 2009 - dl.acm.org
We present the DOOP framework for points-to analysis of Java programs. DOOP builds on
the idea of specifying pointer analysis algorithms declaratively, using Datalog: a logic-based …

Cloning-based context-sensitive pointer alias analysis using binary decision diagrams

J Whaley, MS Lam - Proceedings of the ACM SIGPLAN 2004 conference …, 2004 - dl.acm.org
This paper presents the first scalable context-sensitive, inclusion-based pointer alias
analysis for Java programs. Our approach to context sensitivity is to create a clone of a …

Effective static race detection for Java

M Naik, A Aiken, J Whaley - Proceedings of the 27th ACM SIGPLAN …, 2006 - dl.acm.org
We present a novel technique for static race detection in Java programs, comprised of a
series of stages that employ a combination of static analyses to successively reduce the …

Pointer analysis

Y Smaragdakis, G Balatsouras - Foundations and Trends® in …, 2015 - nowpublishers.com
Pointer analysis is a fundamental static program analysis, with a rich literature and wide
applications. The goal of pointer analysis is to compute an approximation of the set of …

Heap abstractions for static analysis

V Kanvar, UP Khedker - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Heap data is potentially unbounded and seemingly arbitrary. Hence, unlike stack and static
data, heap data cannot be abstracted in terms of a fixed set of program variables. This …

Pycg: Practical call graph generation in python

V Salis, T Sotiropoulos, P Louridas… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Call graphs play an important role in different contexts, such as profiling and vulnerability
propagation analysis. Generating call graphs in an efficient manner can be a challenging …

Parameterized object sensitivity for points-to analysis for Java

A Milanova, A Rountev, BG Ryder - ACM Transactions on Software …, 2005 - dl.acm.org
The goal of points-to analysis for Java is to determine the set of objects pointed to by a
reference variable or a reference object field. We present object sensitivity, a new form of …

Refinement-based context-sensitive points-to analysis for Java

M Sridharan, R Bodík - ACM SIGPLAN Notices, 2006 - dl.acm.org
We present a scalable and precise context-sensitive points-to analysis with three key
properties:(1) filtering out of unrealizable paths,(2) a context-sensitive heap abstraction, and …