Analysing the Impact of Workloads on Modeling the Performance of Configurable Software Systems

S Mühlbauer, F Sattler, C Kaltenecker… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Modern software systems often exhibit numerous configuration options to tailor them to user
requirements, including the system's performance behavior. Performance models derived …

Enhancing search-based testing with testability transformations for existing APIs

A Arcuri, JP Galeotti - ACM Transactions on Software Engineering and …, 2021 - dl.acm.org
Search-based software testing (SBST) has been shown to be an effective technique to
generate test cases automatically. Its effectiveness strongly depends on the guidance of the …

TaintBench: Automatic real-world malware benchmarking of Android taint analyses

L Luo, F Pauck, G Piskachev, M Benz… - Empirical Software …, 2022 - Springer
Due to the lack of established real-world benchmark suites for static taint analyses of
Android applications, evaluations of these analyses are often restricted and hard to …

[PDF][PDF] Towards Precise Reporting of Cryptographic Misuses

Y Chen, Y Liu, KL Wu, DV Le… - … 2024 Network and …, 2024 - ndss-symposium.org
In the last decade, a series of papers were published on using static analysis to detect
cryptographic API misuse. In each paper, apps are checked against a set of rules to see if …

Difuzer: Uncovering suspicious hidden sensitive operations in android apps

J Samhi, L Li, TF Bissyandé, J Klein - Proceedings of the 44th …, 2022 - dl.acm.org
One prominent tactic used to keep malicious behavior from being detected during dynamic
test campaigns is logic bombs, where malicious operations are triggered only when specific …

Automatic testing and benchmarking for configurable static analysis tools

A Mordahl - Proceedings of the 32nd ACM SIGSOFT International …, 2023 - dl.acm.org
Static analysis is an important tool for detecting bugs in real-world software. The advent of
numerous analysis algorithms with their own tradeoffs has led to the proliferation of …

Negative results of fusing code and documentation for learning to accurately identify sensitive source and sink methods: An application to the android framework for …

J Samhi, M Kober, AK Kabore, S Arzt… - … on Software Analysis …, 2023 - ieeexplore.ieee.org
Apps on mobile phones manipulate all sorts of data, including sensitive data, leading to
privacy-related concerns. Recent regulations like the European GDPR provide rules for the …

Demystifying Template-Based Invariant Generation for Bit-Vector Programs

P Yao, J Ke, J Sun, H Fu, R Wu… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
The template-based approach to invariant generation is a parametric and relatively
complete methodology for inferring loop invariants. The relative completeness ensures the …

The impact of tool configuration spaces on the evaluation of configurable taint analysis for android

A Mordahl, S Wei - Proceedings of the 30th ACM SIGSOFT International …, 2021 - dl.acm.org
The most popular static taint analysis tools for Android allow users to change the underlying
analysis algorithms through configuration options. However, the large configuration spaces …

Reducing the memory footprint of IFDS-based data-flow analyses using fine-grained garbage collection

D He, Y Gui, Y Gao, J Xue - Proceedings of the 32nd ACM SIGSOFT …, 2023 - dl.acm.org
The IFDS algorithm can be both memory-and compute-intensive for large programs as it
needs to store a huge amount of path edges in memory and process them until a fixed point …