Phasar: An inter-procedural static analysis framework for c/c++

PD Schubert, B Hermann, E Bodden - … on Tools and Algorithms for the …, 2019 - Springer
Static program analysis is used to automatically determine program properties, or to detect
bugs or security vulnerabilities in programs. It can be used as a stand-alone tool or to aid …

On the effect of transitivity and granularity on vulnerability propagation in the maven ecosystem

AM Mir, M Keshani, S Proksch - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Reusing software libraries is a pillar of modern software engineering. In 2022, the average
Java application depends on 40 third-party libraries. Relying on such libraries exposes a …

From needs to actions to secure apps? the effect of requirements and developer practices on app security

C Weir, B Hermann, S Fahl - 29th USENIX security symposium (USENIX …, 2020 - usenix.org
Increasingly mobile device users are being hurt by security or privacy issues with the apps
they use. App developers can help prevent this; inexpensive security assurance techniques …

CodeMatch: obfuscation won't conceal your repackaged app

L Glanz, S Amann, M Eichberg, M Reif… - Proceedings of the …, 2017 - dl.acm.org
An established way to steal the income of app developers, or to trick users into installing
malware, is the creation of repackaged apps. These are clones of-typically-successful apps …

Modular collaborative program analysis in OPAL

D Helm, F Kübler, M Reif, M Eichberg… - Proceedings of the 28th …, 2020 - dl.acm.org
Current approaches combining multiple static analyses deriving different, independent
properties focus either on modularity or performance. Whereas declarative approaches …

Tai-e: A developer-friendly static analysis framework for Java by harnessing the good designs of classics

T Tan, Y Li - Proceedings of the 32nd ACM SIGSOFT International …, 2023 - dl.acm.org
Static analysis is a mature field with applications to bug detection, security analysis, program
understanding, optimization, and more. To facilitate these applications, static analysis …

Hidden in plain sight: Obfuscated strings threatening your privacy

L Glanz, P Müller, L Baumgärtner, M Reif… - Proceedings of the 15th …, 2020 - dl.acm.org
String obfuscation is an established technique used by proprietary, closed-source
applications to protect intellectual property. Furthermore, it is also frequently used to hide …

Effect handlers for the masses

JI Brachthäuser, P Schuster, K Ostermann - Proceedings of the ACM on …, 2018 - dl.acm.org
Effect handlers are a program structuring paradigm with rising popularity in the functional
programming language community and can express many advanced control flow …

A study of call graph construction for jvm-hosted languages

K Ali, X Lai, Z Luo, O Lhoták, J Dolby… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Call graphs have many applications in software engineering, including bug-finding, security
analysis, and code navigation in IDEs. However, the construction of call graphs requires …

Removing dependencies from large software projects: are you really sure?

CC Chuang, L Cruz, R Van Dalen… - 2022 IEEE 22nd …, 2022 - ieeexplore.ieee.org
When developing and maintaining large software systems, a great deal of effort goes into
dependency management. During the whole lifecycle of a software project, the set of …