Challenges for static analysis of java reflection-literature review and empirical study

D Landman, A Serebrenik… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
The behavior of software that uses the Java Reflection API is fundamentally hard to predict
by analyzing code. Only recent static analysis approaches can resolve reflection under …

A survey of detection methods for XSS attacks

U Sarmah, DK Bhattacharyya, JK Kalita - Journal of Network and Computer …, 2018 - Elsevier
Cross-site scripting attack (abbreviated as XSS) is an unremitting problem for the Web
applications since the early 2000s. It is a code injection attack on the client-side where an …

Smartcheck: Static analysis of ethereum smart contracts

S Tikhomirov, E Voskresenskaya, I Ivanitskiy… - Proceedings of the 1st …, 2018 - dl.acm.org
Ethereum is a major blockchain-based platform for smart contracts-Turing complete
programs that are executed in a decentralized network and usually manipulate digital units …

Iccta: Detecting inter-component privacy leaks in android apps

L Li, A Bartel, TF Bissyandé, J Klein… - 2015 IEEE/ACM 37th …, 2015 - ieeexplore.ieee.org
Shake Them All is a popular" Wallpaper" application exceeding millions of downloads on
Google Play. At installation, this application is given permission to (1) access the Internet (for …

[PDF][PDF] Information flow analysis of android applications in droidsafe.

MI Gordon, D Kim, JH Perkins, L Gilham, N Nguyen… - NDSS, 2015 - people.csail.mit.edu
We present DroidSafe, a static information flow analysis tool that reports potential leaks of
sensitive information in Android applications. DroidSafe combines a comprehensive …

Chex: statically vetting android apps for component hijacking vulnerabilities

L Lu, Z Li, Z Wu, W Lee, G Jiang - … of the 2012 ACM conference on …, 2012 - dl.acm.org
An enormous number of apps have been developed for Android in recent years, making it
one of the most popular mobile operating systems. However, the quality of the booming …

Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale

C Gibler, J Crussell, J Erickson, H Chen - Trust and Trustworthy Computing …, 2012 - Springer
As mobile devices become more widespread and powerful, they store more sensitive data,
which includes not only users' personal information but also the data collected via sensors …

An empirical study of deep learning models for vulnerability detection

B Steenhoek, MM Rahman, R Jiles… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Deep learning (DL) models of code have recently reported great progress for vulnerability
detection. In some cases, DL-based models have outperformed static analysis tools …

Appintent: Analyzing sensitive data transmission in android for privacy leakage detection

Z Yang, M Yang, Y Zhang, G Gu, P Ning… - Proceedings of the 2013 …, 2013 - dl.acm.org
Android phones often carry personal information, attracting malicious developers to embed
code in Android applications to steal sensitive data. With known techniques in the literature …

[PDF][PDF] Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.

C Sendner, H Chen, H Fereidooni, L Petzi, J König… - NDSS, 2023 - ndss-symposium.org
Ethereum smart contracts are automated decentralized applications on the blockchain that
describe the terms of the agreement between buyers and sellers, reducing the need for …