Challenges for static analysis of java reflection-literature review and empirical study

D Landman, A Serebrenik… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
The behavior of software that uses the Java Reflection API is fundamentally hard to predict
by analyzing code. Only recent static analysis approaches can resolve reflection under …

Analysis of JavaScript programs: Challenges and research trends

K Sun, S Ryu - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
JavaScript has been a de facto standard language for client-side web programs, and now it
is expanding its territory to general purpose programs. In this article, we classify the client …

[PDF][PDF] Simulation of Built-in PHP Features for Precise Static Code Analysis.

J Dahse, T Holz - NDSS, 2014 - ndss-symposium.org
The World Wide Web grew rapidly during the last decades and is used by millions of people
every day for online shopping, banking, networking, and other activities. Many of these …

Tchecker: Precise static inter-procedural analysis for detecting taint-style vulnerabilities in php applications

C Luo, P Li, W Meng - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
PHP applications provide various interfaces for end-users to interact with on the Web. They
thus are prone to taint-style vulnerabilities such as SQL injection and cross-site scripting. For …

Static Detection of {Second-Order} Vulnerabilities in Web Applications

J Dahse, T Holz - 23rd USENIX Security Symposium (USENIX Security …, 2014 - usenix.org
Web applications evolved in the last decades from simple scripts to multi-functional
applications. Such complex web applications are prone to different types of security …

{FUGIO}: Automatic Exploit Generation for {PHP} Object Injection Vulnerabilities

S Park, D Kim, S Jana, S Son - 31st USENIX Security Symposium …, 2022 - usenix.org
A PHP object injection (POI) vulnerability is a security-critical bug that allows the remote
code execution of class methods existing in a vulnerable PHP application. Exploiting this …

Deemon: Detecting CSRF with dynamic analysis and property graphs

G Pellegrino, M Johns, S Koch, M Backes… - Proceedings of the 2017 …, 2017 - dl.acm.org
Cross-Site Request Forgery (CSRF) vulnerabilities are a severe class of web vulnerabilities
that have received only marginal attention from the research and security testing …

[HTML][HTML] An enhanced static taint analysis approach to detect input validation vulnerability

AW Marashdih, ZF Zaaba, K Suwais - Journal of King Saud University …, 2023 - Elsevier
The detection of feasible paths helps to minimize the false positive rate. However, the
previous works did not consider the feasibility of the program paths during the analysis …

Webapp service for booking handyman using mongodb, express JS, react JS, node JS

K Saundariya, M Abirami, KR Senthil… - 2021 3rd …, 2021 - ieeexplore.ieee.org
In recent days, there is a rapid increase in the need for handyman services around the
world. If any issue is unfortunately encountered in the home, some issues may be hectic and …

The programming language wars: Questions and responsibilities for the programming language community

A Stefik, S Hanenberg - Proceedings of the 2014 ACM International …, 2014 - dl.acm.org
The discipline of computer science has a long and complicated history with computer
programming languages. Historically, inventors have created language products for a wide …