Sign Up to like & get
recommendations!
0
Published in 2017 at "Soft Computing"
DOI: 10.1007/s00500-015-2017-6
Abstract: Fuzz testing is widely used as an automatic solution for discovering vulnerabilities in binary programs that process files. Restricted by their high blindness and low code path coverage, fuzzing tests typically provide quite low efficiencies.…
read more here.
Keywords:
api memory;
memory;
memory fuzzing;
taint analysis ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Transactions on Software Engineering"
DOI: 10.1109/tse.2018.2871666
Abstract: With the advent of multicore processors, there is a great need to write parallel programs to take advantage of parallel computing resources. However, due to the nondeterminism of parallel execution, the malware behaviors sensitive to…
read more here.
Keywords:
execution;
symbolic analysis;
thread scheduling;
taint analysis ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Software Engineering"
DOI: 10.1109/tse.2018.2878020
Abstract: Previous approaches to dynamic taint analysis for JavaScript are implemented directly in a browser or JavaScript engine, limiting their applicability to a single platform and requiring ongoing maintenance as platforms evolve, or they require nontrivial…
read more here.
Keywords:
analysis javascript;
platform independent;
taint analysis;
dynamic taint ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Software Engineering"
DOI: 10.1109/tse.2021.3109563
Abstract: Numerous static taint analysis techniques have recently been proposed for identifying information flows in mobile applications. These techniques are often optimized and evaluated on a set of synthetic benchmarks, which makes the comparison results difficult…
read more here.
Keywords:
analysis;
taint analysis;
analysis tools;
flowdroid amandroid ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "China Communications"
DOI: 10.23919/jcc.2023.03.022
Abstract: In recent years, Android applications have caused personal privacy leaks frequently. In order to analyze the malicious behavior, taint analysis technology can be used to track the API call chain, build a control-flow graph of…
read more here.
Keywords:
framework;
analysis;
android applications;
taint analysis ... See more keywords