SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability

Z Liao, Z Zheng, X Chen, Y Nan - Proceedings of the 31st ACM …, 2022 - dl.acm.org
With the increasing popularity of blockchain, automatically detecting vulnerabilities in smart
contracts is becoming a significant problem. Prior research mainly identifies smart contract …

A cocktail approach to practical call graph construction

Y Cai, C Zhang - Proceedings of the ACM on Programming Languages, 2023 - dl.acm.org
After decades of research, constructing call graphs for modern C-based software remains
either imprecise or inefficient when scaling up to the ever-growing complexity. The main …

[PDF][PDF] Unleashing the power of type-based call graph construction by using regional pointer information

Y Cai, Y Jin, C Zhang - 33nd USENIX Security Symposium (USENIX …, 2024 - usenix.org
When dealing with millions of lines of C code, we still cannot have the cake and eat it: type
analysis for call graph construction is scalable yet highly imprecise. We address this …

Seal: integrating program analysis and repository mining

F Sattler, S Böhm, PD Schubert, N Siegmund… - ACM Transactions on …, 2023 - dl.acm.org
Software projects are complex technical and organizational systems involving large
numbers of artifacts and developers. To understand and tame software complexity, a wide …

Understanding the Impact of Fingerprinting in Android Hybrid Apps

A Tiwari, J Prakash, A Rahimov… - 2023 IEEE/ACM 10th …, 2023 - ieeexplore.ieee.org
Numerous studies demonstrate that browser fingerprinting is detrimental to users' security
and privacy. However, little is known about the effects of browser fingerprinting on Android …

Detecting security vulnerabilities with vulnerability nets

P Wang, S Liu, A Liu, W Jiang - Journal of Systems and Software, 2024 - Elsevier
Detecting security vulnerabilities is a crucial part in secure software development. Many
static analysis tools have proved to be effective in finding vulnerabilities, but generally there …

Scaling Type-Based Points-to Analysis with Saturation

C Wimmer, C Stancu, D Kozak… - Proceedings of the ACM on …, 2024 - dl.acm.org
Designing a whole-program static analysis requires trade-offs between precision and
scalability. While a context-insensitive points-to analysis is often considered a good …

SPATA: Effective OS bug detection with summary-based, alias-aware, and path-sensitive typestate analysis

T Li, JJ Bai, Y Sui, SM Hu - ACM Transactions on Computer Systems, 2024 - dl.acm.org
The operating system (OS) is the cornerstone for computer systems. It manages hardware
and provides fundamental service for user-level applications. Thus, detecting bugs in OSes …

Frankenstein: fast and lightweight call graph generation for software builds

M Keshani, G Gousios, S Proksch - Empirical Software Engineering, 2024 - Springer
Call Graphs are a rich data source and form the foundation for advanced static analyses that
can, for example, detect security vulnerabilities or dead code. This information is invaluable …

Interactive Abstract Interpretation with Demanded Summarization

B Stein, BYE Chang, M Sridharan - ACM Transactions on Programming …, 2024 - dl.acm.org
We consider the problem of making expressive, interactive static analyzers compositional.
Such a technique could help bring the power of server-based static analyses to integrated …