J Späth, K Ali, E Bodden - Proceedings of the ACM on Programming …, 2019 - dl.acm.org
Precise static analyses are context-, field-and flow-sensitive. Context-and field-sensitivity are both expressible as context-free language (CFL) reachability problems. Solving both CFL …
N Grech, Y Smaragdakis - Proceedings of the ACM on Programming …, 2017 - dl.acm.org
Static information-flow analysis (especially taint-analysis) is a key technique in software security, computing where sensitive or untrusted data can propagate in a program. Points-to …
S Keidel, S Erdweg, T Hombücher - Proceedings of the ACM on …, 2023 - dl.acm.org
Big-step abstract interpreters are an approach to build static analyzers based on big-step interpretation. While big-step interpretation provides a number of benefits for the definition of …
Today, every application uses software libraries. Yet, while a lot of research exists wrt analyzing applications, research that targets the analysis of libraries independent of any …
Precise data-flow analyses frequently model field accesses through access paths with varying length. While using longer access paths increases precision, their size must be …
User-driven access control improves the coarse-grained access control of current operating systems (particularly in the mobile space) that provide only all-or-nothing access to a …
S Schmeelk, J Yang, A Aho - Proceedings of the 10th annual cyber and …, 2015 - dl.acm.org
During 2014, Business Insider announced that there are over a billion users of Android worldwide. Government officials are also trending towards acquiring Android mobile …
S Munir, W Taha - arXiv preprint arXiv:2301.06079, 2023 - arxiv.org
Smart contracts are programs that execute transactions involving independent parties and cryptocurrencies. As programs, smart contracts are susceptible to a wide range of errors and …
During the development of security-critical software, the system implementation must capture the security properties postulated by the architectural design. This paper presents …