Challenges for static analysis of java reflection-literature review and empirical study

D Landman, A Serebrenik… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
The behavior of software that uses the Java Reflection API is fundamentally hard to predict
by analyzing code. Only recent static analysis approaches can resolve reflection under …

Using natural language processing to automatically detect self-admitted technical debt

E da Silva Maldonado, E Shihab… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The metaphor of technical debt was introduced to express the trade off between productivity
and quality, ie, when developers take shortcuts or perform quick hacks. More recently, our …

Pycg: Practical call graph generation in python

V Salis, T Sotiropoulos, P Louridas… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Call graphs play an important role in different contexts, such as profiling and vulnerability
propagation analysis. Generating call graphs in an efficient manner can be a challenging …

[PDF][PDF] EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.

Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel… - NDSS, 2015 - yinzhicao.org
A wealth of recent research proposes static data flow analysis for the security analysis of
Android applications. One of the building blocks that these analysis systems rely upon is the …

An efficient application partitioning algorithm in mobile environments

H Wu, WJ Knottenbelt, K Wolter - IEEE Transactions on Parallel …, 2019 - ieeexplore.ieee.org
Application partitioning that splits the executions into local and remote parts, plays a critical
role in high-performance mobile offloading systems. Optimal partitioning will allow mobile …

Multi-objective decision-making for mobile cloud offloading: A survey

H Wu - IEEE Access, 2018 - ieeexplore.ieee.org
Running very complex applications on mobile devices is still challenging since they are
constrained by limited resources, such as memory capacity, network bandwidth, processor …

Effective real-time android application auditing

M Xia, L Gong, Y Lyu, Z Qi, X Liu - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Mobile applications can access both sensitive personal data and the network, giving rise to
threats of data leaks. App auditing is a fundamental program analysis task to reveal such …

Hybrid context-sensitivity for points-to analysis

G Kastrinis, Y Smaragdakis - ACM SIGPLAN Notices, 2013 - dl.acm.org
Context-sensitive points-to analysis is valuable for achieving high precision with good
performance. The standard flavors of context-sensitivity are call-site-sensitivity (kCFA) and …

Practical static analysis of JavaScript applications in the presence of frameworks and libraries

M Madsen, B Livshits, M Fanning - Proceedings of the 2013 9th Joint …, 2013 - dl.acm.org
JavaScript is a language that is widely-used for both web-based and standalone
applications such as those in the upcoming Windows 8 operating system. Analysis of …

A cocktail approach to practical call graph construction

Y Cai, C Zhang - Proceedings of the ACM on Programming Languages, 2023 - dl.acm.org
After decades of research, constructing call graphs for modern C-based software remains
either imprecise or inefficient when scaling up to the ever-growing complexity. The main …