Search Results - "Theory of computation Semantics and reasoning Program reasoning Program analysis"

Refine Results
  1. 1

    Automated Third-Party Library Detection for Android Applications: Are We There Yet? by Zhan, Xian, Fan, Lingling, Liu, Tianming, Chen, Sen, Li, Li, Wang, Haoyu, Xu, Yifei, Luo, Xiapu, Liu, Yang

    ISSN: 2643-1572
    Published: ACM 01.09.2020
    “…Third-party libraries (TPLs) have become a significant part of the Android ecosystem. Developers can employ various TPLs with different functionalities to…”
    Get full text
    Conference Proceeding
  2. 2

    PyCG: Practical Call Graph Generation in Python by Salis, Vitalis, Sotiropoulos, Thodoris, Louridas, Panos, Spinellis, Diomidis, Mitropoulos, Dimitris

    ISBN: 1665402962, 9781665402965
    ISSN: 1558-1225
    Published: IEEE 01.05.2021
    “…Call graphs play an important role in different contexts, such as profiling and vulnerability propagation analysis. Generating call graphs in an efficient…”
    Get full text
    Conference Proceeding
  3. 3

    S-gram: Towards Semantic-Aware Security Auditing for Ethereum Smart Contracts by Liu, Han, Liu, Chao, Zhao, Wenqi, Jiang, Yu, Sun, Jiaguang

    ISSN: 2643-1572
    Published: ACM 01.09.2018
    “…Smart contracts, as a promising and powerful application on the Ethereum blockchain, have been growing rapidly in the past few years. Since they are highly…”
    Get full text
    Conference Proceeding
  4. 4

    Spatio-temporal context reduction: a pointer-analysis-based static approach for detecting use-after-free vulnerabilities by Yan, Hua, Sui, Yulei, Chen, Shiping, Xue, Jingling

    ISBN: 9781450356381, 1450356389
    ISSN: 1558-1225
    Published: New York, NY, USA ACM 27.05.2018
    “…Zero-day Use-After-Free (UAF) vulnerabilities are increasingly popular and highly dangerous, but few mitigations exist. We introduce a new…”
    Get full text
    Conference Proceeding
  5. 5

    StubDroid: Automatic Inference of Precise Data-Flow Summaries for the Android Framework by Arzt, Steven, Bodden, Eric

    ISSN: 1558-1225
    Published: ACM 01.05.2016
    “…Smartphone users suffer from insucient information on how commercial as well as malicious apps handle sensitive data stored on their phones. Automated taint…”
    Get full text
    Conference Proceeding
  6. 6

    Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders by Bodden, Eric, Sewe, Andreas, Sinschek, Jan, Oueslati, Hela, Mezini, Mira

    ISBN: 9781450304450, 1450304451
    ISSN: 0270-5257
    Published: New York, NY, USA ACM 21.05.2011
    “…Static program analyses and transformations for Java face many problems when analyzing programs that use reflection or custom class loaders: How can a static…”
    Get full text
    Conference Proceeding
  7. 7

    flowR: A Static Program Slicer for R by Sihler, Florian, Tichy, Matthias

    ISSN: 2643-1572
    Published: ACM 27.10.2024
    “…Context Many researchers rely on the R programming language to perform their statistical analyses and visualizations in the form of R scripts. However, recent…”
    Get full text
    Conference Proceeding
  8. 8

    Improving the Comprehension of R Programs by Hybrid Dataflow Analysis by Sihler, Florian

    ISSN: 2643-1572
    Published: ACM 27.10.2024
    “…Context Comprehending code is crucial in all areas of software development, with many existing supporting tools and techniques for various languages. However,…”
    Get full text
    Conference Proceeding
  9. 9

    Language-Agnostic Static Analysis of Probabilistic Programs by Bock, Markus, Schroder, Michael, Cito, Jurgen

    ISSN: 2643-1572
    Published: ACM 27.10.2024
    “…Probabilistic programming allows developers to focus on the modeling aspect in the Bayesian workflow by abstracting away the posterior inference machinery. In…”
    Get full text
    Conference Proceeding
  10. 10

    DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps by Yang, Shao, Wang, Yuehan, Yao, Yuan, Wang, Haoyu, Ye, Yanfang Fanny, Xiao, Xusheng

    ISSN: 1558-1225
    Published: ACM 01.05.2022
    “…While mobile applications (i.e., apps) are becoming capable of handling various needs from users, their increasing access to sensitive data raises privacy…”
    Get full text
    Conference Proceeding
  11. 11

    Context Debloating for Object-Sensitive Pointer Analysis by He, Dongjie, Lu, Jingbo, Xue, Jingling

    ISSN: 2643-1572
    Published: IEEE 01.11.2021
    “…We Introduce a new approach, Conch, for debloating contexts for all the object-sensitive pointer analysis algorithms developed for object-oriented languages,…”
    Get full text
    Conference Proceeding
  12. 12

    Boosting Path-Sensitive Value Flow Analysis Via Removal of Redundant Summaries by Wang, Yongchao, Cai, Yuandao, Zhang, Charles

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…Value flow analysis that tracks the flow of values via data dependence is a widely used technique for detecting a broad spectrum of software bugs. However, the…”
    Get full text
    Conference Proceeding
  13. 13

    Module-Aware Context Sensitive Pointer Analysis by Li, Haofeng, Shi, Chenghang, Lu, Jie, Li, Lian, Zhao, Zixuan

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…The Java Platform Module System (JPMS) has found widespread applications since introduced in Java 9. However, existing pointer analyses fail to leverage the…”
    Get full text
    Conference Proceeding
  14. 14

    Static Analysis of Remote Procedure Call in Java Programs by Cui, Baoquan, Qu, Rong, Tang, Zhen, Zhang, Jian

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…The Remote Procedure Call (RPC) is commonly used for inter-process communications over network, allowing a program to invoke a procedure in another address…”
    Get full text
    Conference Proceeding
  15. 15

    An Extensive Empirical Study of Nondeterministic Behavior in Static Analysis Tools by Miao, Miao, Mordahl, Austin, Soles, Dakota, Beideck, Alice, Wei, Shiyi

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…Recent research has studied the importance and identified causes of nondeterminism in software. Static analysis tools exhibit many risk factors for…”
    Get full text
    Conference Proceeding
  16. 16

    PREACH: A Heuristic for Probabilistic Reachability to Identify Hard to Reach Statements by Saha, Seemanta, Downing, Mara, Brennan, Tegan, Bultan, Tevfik

    ISSN: 1558-1225
    Published: ACM 01.05.2022
    “…We present a heuristic for approximating the likelihood of reaching a given program statement using 1) branch selectivity (representing the percentage of…”
    Get full text
    Conference Proceeding
  17. 17

    PROMAL: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning by Liu, Changlin, Wang, Hanlin, Liu, Tianming, Gu, Diandian, Ma, Yun, Wang, Haoyu, Xiao, Xusheng

    ISSN: 1558-1225
    Published: ACM 01.05.2022
    “…Mobile apps have been an integral part in our daily life. As these apps become more complex, it is critical to provide automated analysis techniques to ensure…”
    Get full text
    Conference Proceeding
  18. 18

    EnMobile: entity-based characterization and analysis of mobile malware by Yang, Wei, Prasad, Mukul R., Xie, Tao

    ISBN: 9781450356381, 1450356389
    ISSN: 1558-1225
    Published: New York, NY, USA ACM 27.05.2018
    “…Modern mobile malware tend to conduct their malicious exploits through sophisticated patterns of interactions that involve multiple entities, e.g., the mobile…”
    Get full text
    Conference Proceeding
  19. 19

    ReuNify: A Step Towards Whole Program Analysis for React Native Android Apps by Liu, Yonghui, Chen, Xiao, Liu, Pei, Grundy, John, Chen, Chunyang, Li, Li

    ISSN: 2643-1572
    Published: IEEE 11.09.2023
    “…React Native is a widely-used open-source frame-work that facilitates the development of cross-platform mobile apps. The framework enables JavaScript code to…”
    Get full text
    Conference Proceeding
  20. 20

    PacDroid: A Pointer-Analysis-Centric Framework for Security Vulnerabilities in Android Apps by Chen, Menglong, Tan, Tian, Pan, Minxue, Li, Yue

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…General frameworks such as FlowDroid, IccTA, P/Taint, Amandroid, and DroidSafe have significantly advanced the development of static analysis tools for Android…”
    Get full text
    Conference Proceeding