Karonte: Detecting insecure multi-binary interactions in embedded firmware

N Redini, A Machiry, R Wang… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Low-power, single-purpose embedded devices (eg, routers and IoT devices) have become
ubiquitous. While they automate and simplify many aspects of users' lives, recent large-scale …

Context-, flow-, and field-sensitive data-flow analysis using synchronized pushdown systems

J Späth, K Ali, E Bodden - Proceedings of the ACM on Programming …, 2019 - dl.acm.org
Precise static analyses are context-, field-and flow-sensitive. Context-and field-sensitivity are
both expressible as context-free language (CFL) reachability problems. Solving both CFL …

P/taint: Unified points-to and taint analysis

N Grech, Y Smaragdakis - Proceedings of the ACM on Programming …, 2017 - dl.acm.org
Static information-flow analysis (especially taint-analysis) is a key technique in software
security, computing where sensitive or untrusted data can propagate in a program. Points-to …

Combinator-Based Fixpoint Algorithms for Big-Step Abstract Interpreters

S Keidel, S Erdweg, T Hombücher - Proceedings of the ACM on …, 2023 - dl.acm.org
Big-step abstract interpreters are an approach to build static analyzers based on big-step
interpretation. While big-step interpretation provides a number of benefits for the definition of …

Call graph construction for java libraries

M Reif, M Eichberg, B Hermann, J Lerch… - Proceedings of the 2016 …, 2016 - dl.acm.org
Today, every application uses software libraries. Yet, while a lot of research exists wrt
analyzing applications, research that targets the analysis of libraries independent of any …

Access-path abstraction: Scaling field-sensitive data-flow analysis with unbounded access paths (t)

J Lerch, J Späth, E Bodden… - 2015 30th IEEE/ACM …, 2015 - ieeexplore.ieee.org
Precise data-flow analyses frequently model field accesses through access paths with
varying length. While using longer access paths increases precision, their size must be …

Audacious: User-driven access control with unmodified operating systems

T Ringer, D Grossman, F Roesner - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
User-driven access control improves the coarse-grained access control of current operating
systems (particularly in the mobile space) that provide only all-or-nothing access to a …

Android malware static analysis techniques

S Schmeelk, J Yang, A Aho - Proceedings of the 10th annual cyber and …, 2015 - dl.acm.org
During 2014, Business Insider announced that there are over a billion users of Android
worldwide. Government officials are also trending towards acquiring Android mobile …

Pre-deployment Analysis of Smart Contracts--A Survey

S Munir, W Taha - arXiv preprint arXiv:2301.06079, 2023 - arxiv.org
Smart contracts are programs that execute transactions involving independent parties and
cryptocurrencies. As programs, smart contracts are susceptible to a wide range of errors and …

Secure data-flow compliance checks between models and code based on automated mappings

S Peldszus, K Tuma, D Strüber… - 2019 ACM/IEEE …, 2019 - ieeexplore.ieee.org
During the development of security-critical software, the system implementation must
capture the security properties postulated by the architectural design. This paper presents …