Search Results - "Theory of computation Semantics and reasoning Program reasoning Program analysis"
-
1
Automated Third-Party Library Detection for Android Applications: Are We There Yet?
ISSN: 2643-1572Published: ACM 01.09.2020Published in 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE) (01.09.2020)“…Third-party libraries (TPLs) have become a significant part of the Android ecosystem. Developers can employ various TPLs with different functionalities to…”
Get full text
Conference Proceeding -
2
PyCG: Practical Call Graph Generation in Python
ISBN: 1665402962, 9781665402965ISSN: 1558-1225Published: IEEE 01.05.2021Published in Proceedings / International Conference on Software Engineering (01.05.2021)“…Call graphs play an important role in different contexts, such as profiling and vulnerability propagation analysis. Generating call graphs in an efficient…”
Get full text
Conference Proceeding -
3
S-gram: Towards Semantic-Aware Security Auditing for Ethereum Smart Contracts
ISSN: 2643-1572Published: ACM 01.09.2018Published in 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE) (01.09.2018)“…Smart contracts, as a promising and powerful application on the Ethereum blockchain, have been growing rapidly in the past few years. Since they are highly…”
Get full text
Conference Proceeding -
4
Spatio-temporal context reduction: a pointer-analysis-based static approach for detecting use-after-free vulnerabilities
ISBN: 9781450356381, 1450356389ISSN: 1558-1225Published: New York, NY, USA ACM 27.05.2018Published in 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE) (27.05.2018)“…Zero-day Use-After-Free (UAF) vulnerabilities are increasingly popular and highly dangerous, but few mitigations exist. We introduce a new…”
Get full text
Conference Proceeding -
5
StubDroid: Automatic Inference of Precise Data-Flow Summaries for the Android Framework
ISSN: 1558-1225Published: ACM 01.05.2016Published in Proceedings / International Conference on Software Engineering (01.05.2016)“…Smartphone users suffer from insucient information on how commercial as well as malicious apps handle sensitive data stored on their phones. Automated taint…”
Get full text
Conference Proceeding -
6
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders
ISBN: 9781450304450, 1450304451ISSN: 0270-5257Published: New York, NY, USA ACM 21.05.2011Published in 2011 33rd International Conference on Software Engineering (ICSE) (21.05.2011)“…Static program analyses and transformations for Java face many problems when analyzing programs that use reflection or custom class loaders: How can a static…”
Get full text
Conference Proceeding -
7
flowR: A Static Program Slicer for R
ISSN: 2643-1572Published: ACM 27.10.2024Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…Context Many researchers rely on the R programming language to perform their statistical analyses and visualizations in the form of R scripts. However, recent…”
Get full text
Conference Proceeding -
8
Improving the Comprehension of R Programs by Hybrid Dataflow Analysis
ISSN: 2643-1572Published: ACM 27.10.2024Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…Context Comprehending code is crucial in all areas of software development, with many existing supporting tools and techniques for various languages. However,…”
Get full text
Conference Proceeding -
9
Language-Agnostic Static Analysis of Probabilistic Programs
ISSN: 2643-1572Published: ACM 27.10.2024Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…Probabilistic programming allows developers to focus on the modeling aspect in the Bayesian workflow by abstracting away the posterior inference machinery. In…”
Get full text
Conference Proceeding -
10
DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps
ISSN: 1558-1225Published: ACM 01.05.2022Published in 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01.05.2022)“…While mobile applications (i.e., apps) are becoming capable of handling various needs from users, their increasing access to sensitive data raises privacy…”
Get full text
Conference Proceeding -
11
Context Debloating for Object-Sensitive Pointer Analysis
ISSN: 2643-1572Published: IEEE 01.11.2021Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (01.11.2021)“…We Introduce a new approach, Conch, for debloating contexts for all the object-sensitive pointer analysis algorithms developed for object-oriented languages,…”
Get full text
Conference Proceeding -
12
Boosting Path-Sensitive Value Flow Analysis Via Removal of Redundant Summaries
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…Value flow analysis that tracks the flow of values via data dependence is a widely used technique for detecting a broad spectrum of software bugs. However, the…”
Get full text
Conference Proceeding -
13
Module-Aware Context Sensitive Pointer Analysis
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…The Java Platform Module System (JPMS) has found widespread applications since introduced in Java 9. However, existing pointer analyses fail to leverage the…”
Get full text
Conference Proceeding -
14
Static Analysis of Remote Procedure Call in Java Programs
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…The Remote Procedure Call (RPC) is commonly used for inter-process communications over network, allowing a program to invoke a procedure in another address…”
Get full text
Conference Proceeding -
15
An Extensive Empirical Study of Nondeterministic Behavior in Static Analysis Tools
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…Recent research has studied the importance and identified causes of nondeterminism in software. Static analysis tools exhibit many risk factors for…”
Get full text
Conference Proceeding -
16
PREACH: A Heuristic for Probabilistic Reachability to Identify Hard to Reach Statements
ISSN: 1558-1225Published: ACM 01.05.2022Published in 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01.05.2022)“…We present a heuristic for approximating the likelihood of reaching a given program statement using 1) branch selectivity (representing the percentage of…”
Get full text
Conference Proceeding -
17
PROMAL: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning
ISSN: 1558-1225Published: ACM 01.05.2022Published in 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01.05.2022)“…Mobile apps have been an integral part in our daily life. As these apps become more complex, it is critical to provide automated analysis techniques to ensure…”
Get full text
Conference Proceeding -
18
EnMobile: entity-based characterization and analysis of mobile malware
ISBN: 9781450356381, 1450356389ISSN: 1558-1225Published: New York, NY, USA ACM 27.05.2018Published in 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE) (27.05.2018)“…Modern mobile malware tend to conduct their malicious exploits through sophisticated patterns of interactions that involve multiple entities, e.g., the mobile…”
Get full text
Conference Proceeding -
19
ReuNify: A Step Towards Whole Program Analysis for React Native Android Apps
ISSN: 2643-1572Published: IEEE 11.09.2023Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“…React Native is a widely-used open-source frame-work that facilitates the development of cross-platform mobile apps. The framework enables JavaScript code to…”
Get full text
Conference Proceeding -
20
PacDroid: A Pointer-Analysis-Centric Framework for Security Vulnerabilities in Android Apps
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…General frameworks such as FlowDroid, IccTA, P/Taint, Amandroid, and DroidSafe have significantly advanced the development of static analysis tools for Android…”
Get full text
Conference Proceeding

