CLAPP: characterizing loops in Android applications
暂无分享,去创建一个
Christopher Krügel | Yanick Fratantonio | Giovanni Vigna | Antonio Bianchi | Aravind Machiry | Christopher Krügel | Giovanni Vigna | Antonio Bianchi | Aravind Machiry | Y. Fratantonio
[1] Joe D. Warren,et al. The program dependence graph and its use in optimization , 1987, TOPL.
[2] Monica S. Lam,et al. A Loop Transformation Theory and an Algorithm to Maximize Parallelism , 1991, IEEE Trans. Parallel Distributed Syst..
[3] Mark N. Wegman,et al. Efficiently computing static single assignment form and the control dependence graph , 1991, TOPL.
[4] Reinhold Heckmann,et al. Worst case execution time prediction by static program analysis , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[5] Daniel Berlin. High-Level Loop Optimizations for GCC , 2004 .
[6] Jan Gustafsson,et al. Automatic Derivation of Loop Bounds and Infeasible Paths for WCET Analysis Using Abstract Execution , 2006, 2006 27th IEEE International Real-Time Systems Symposium (RTSS'06).
[7] Christoph Cullmann,et al. Data-Flow Based Detection of Loop Bounds , 2007, WCET.
[8] Jan Gustafsson,et al. Loop Bound Analysis based on a Combination of Program Slicing, Abstract Interpretation, and Invariant Analysis , 2007, WCET.
[9] Yu Chen,et al. A New Algorithm for Identifying Loops in Decompilation , 2007, SAS.
[10] Yi Yang,et al. A GPGPU compiler for memory optimization and parallelism management , 2010, PLDI '10.
[11] Jens Knoop,et al. Symbolic Loop Bound Computation for WCET Analysis , 2011, Ershov Memorial Conference.
[12] Deepak Kapur,et al. Termination Analysis of C Programs Using Compiler Intermediate Languages , 2011, RTA.
[13] Jürgen Giesl,et al. Automated Detection of Non-termination and NullPointerExceptions for Java Bytecode , 2011, FoVeOOS.
[14] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[15] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[16] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[17] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[18] Bernd Freisleben,et al. Why eve and mallory love android: an analysis of android SSL (in)security , 2012, CCS.
[19] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[20] David Brumley,et al. An empirical study of cryptographic misuse in android applications , 2013, CCS.
[21] Yajin Zhou,et al. Detecting Passive Content Leaks and Pollution in Android Applications , 2013, NDSS.
[22] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[23] Eric Bodden,et al. A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks , 2014, NDSS.
[24] Christopher Krügel,et al. Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications , 2014, NDSS.
[25] Jason Nieh,et al. A measurement study of google play , 2014, SIGMETRICS '14.
[26] Christopher Krügel,et al. CLAPP: characterizing loops in Android applications (invited talk) , 2015, DeMobile@SIGSOFT FSE.