Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2015
AnaDroid
Electronic Notes in Theoretical Computer Science (ENTCS) (ENTCS), Volume 311, Issue CPages 3–14https://doi.org/10.1016/j.entcs.2015.02.002Today's mobile platforms provide only coarse-grained permissions to users with regard to how third-party applications use sensitive private data. Unfortunately, it is easy to disguise malware within the boundaries of legitimately-granted permissions. ...
- ArticleSeptember 2014
Pruning, Pushdown Exception-Flow Analysis
SCAM '14: Proceedings of the 2014 IEEE 14th International Working Conference on Source Code Analysis and ManipulationPages 265–274https://doi.org/10.1109/SCAM.2014.44Statically reasoning in the presence of exceptions and about the effects of exceptions is challenging: exception-flows are mutually determined by traditional control-flow and points-to analyses. We tackle the challenge of analyzing exception-flows from ...
- ArticleSeptember 2014
Fast Flow Analysis with Godel Hashes
SCAM '14: Proceedings of the 2014 IEEE 14th International Working Conference on Source Code Analysis and ManipulationPages 225–234https://doi.org/10.1109/SCAM.2014.40Flow analysis, such as control-flow, data-flow, and exception-flow analysis, usually depends on relational operations on flow sets. Unfortunately, set related operations, such as inclusion and equality, are usually very expensive. They can easily take ...
- research-articleNovember 2013
Sound and precise malware analysis for android via pushdown reachability and entry-point saturation
SPSM '13: Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devicesPages 21–32https://doi.org/10.1145/2516760.2516769Sound malware analysis of Android applications is challenging. First, object-oriented programs exhibit highly interprocedural, dynamically dispatched control structure. Second, the Android programming paradigm relies heavily on the asynchronous ...
- research-articleJune 2012
Hash-flow taint analysis of higher-order programs
PLAS '12: Proceedings of the 7th Workshop on Programming Languages and Analysis for SecurityArticle No.: 8, Pages 1–12https://doi.org/10.1145/2336717.2336725As web applications have grown in popularity, so have attacks on such applications. Cross-site scripting and injection attacks have become particularly problematic. Both vulnerabilities stem, at their core, from improper sanitization of user input.
We ...
- ArticleOctober 2008
HTL: A Locality Bounded Flat Hash Location Service
NPC '08: Proceedings of the IFIP International Conference on Network and Parallel ComputingPages 138–149https://doi.org/10.1007/978-3-540-88140-7_13Many location services have been proposed, but some challenges remain. In this paper, we present a new location service, named HTL (Hash Table Localized) to solve the locality problem, that in a location service, the location information can be stored ...