Challenges for static analysis of java reflection-literature review and empirical study
D Landman, A Serebrenik… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
The behavior of software that uses the Java Reflection API is fundamentally hard to predict
by analyzing code. Only recent static analysis approaches can resolve reflection under …
by analyzing code. Only recent static analysis approaches can resolve reflection under …
Using natural language processing to automatically detect self-admitted technical debt
E da Silva Maldonado, E Shihab… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The metaphor of technical debt was introduced to express the trade off between productivity
and quality, ie, when developers take shortcuts or perform quick hacks. More recently, our …
and quality, ie, when developers take shortcuts or perform quick hacks. More recently, our …
Pycg: Practical call graph generation in python
V Salis, T Sotiropoulos, P Louridas… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Call graphs play an important role in different contexts, such as profiling and vulnerability
propagation analysis. Generating call graphs in an efficient manner can be a challenging …
propagation analysis. Generating call graphs in an efficient manner can be a challenging …
[PDF][PDF] EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
A wealth of recent research proposes static data flow analysis for the security analysis of
Android applications. One of the building blocks that these analysis systems rely upon is the …
Android applications. One of the building blocks that these analysis systems rely upon is the …
An efficient application partitioning algorithm in mobile environments
Application partitioning that splits the executions into local and remote parts, plays a critical
role in high-performance mobile offloading systems. Optimal partitioning will allow mobile …
role in high-performance mobile offloading systems. Optimal partitioning will allow mobile …
Multi-objective decision-making for mobile cloud offloading: A survey
H Wu - IEEE Access, 2018 - ieeexplore.ieee.org
Running very complex applications on mobile devices is still challenging since they are
constrained by limited resources, such as memory capacity, network bandwidth, processor …
constrained by limited resources, such as memory capacity, network bandwidth, processor …
Effective real-time android application auditing
Mobile applications can access both sensitive personal data and the network, giving rise to
threats of data leaks. App auditing is a fundamental program analysis task to reveal such …
threats of data leaks. App auditing is a fundamental program analysis task to reveal such …
Hybrid context-sensitivity for points-to analysis
G Kastrinis, Y Smaragdakis - ACM SIGPLAN Notices, 2013 - dl.acm.org
Context-sensitive points-to analysis is valuable for achieving high precision with good
performance. The standard flavors of context-sensitivity are call-site-sensitivity (kCFA) and …
performance. The standard flavors of context-sensitivity are call-site-sensitivity (kCFA) and …
Practical static analysis of JavaScript applications in the presence of frameworks and libraries
M Madsen, B Livshits, M Fanning - Proceedings of the 2013 9th Joint …, 2013 - dl.acm.org
JavaScript is a language that is widely-used for both web-based and standalone
applications such as those in the upcoming Windows 8 operating system. Analysis of …
applications such as those in the upcoming Windows 8 operating system. Analysis of …
A cocktail approach to practical call graph construction
After decades of research, constructing call graphs for modern C-based software remains
either imprecise or inefficient when scaling up to the ever-growing complexity. The main …
either imprecise or inefficient when scaling up to the ever-growing complexity. The main …