Static Taint Analysis of Event-driven Scheme Programs.
暂无分享,去创建一个
Coen De Roover | Jonas De Bleser | Quentin Stiévenart | Jens Nicolay | Jens Nicolay | Quentin Stiévenart
[1] Patrick Cousot,et al. Andromeda: Accurate and Scalable Security Analysis of Web Applications , 2013, FASE.
[2] Matthew Might,et al. Hash-flow taint analysis of higher-order programs , 2012, PLAS.
[3] Matthew Might,et al. Abstracting abstract machines , 2010, ICFP '10.
[4] Nelma Moreira,et al. On the performance of automata minimization algorithms , 2007 .
[5] Frank Tip,et al. Static analysis of event-driven Node.js JavaScript applications , 2015, OOPSLA.
[6] Michael Sipser,et al. Introduction to the Theory of Computation , 1996, SIGA.
[7] Manu Sridharan,et al. TAJ: effective taint analysis of web applications , 2009, PLDI '09.
[8] Matthew Might,et al. Improving flow analyses via ΓCFA: abstract garbage collection and counting , 2006, ICFP '06.
[9] Laurie Hendren,et al. Soot: a Java bytecode optimization framework , 2010, CASCON.
[10] Peter Thiemann,et al. Type Analysis for JavaScript , 2009, SAS.
[11] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.
[12] Coen De Roover,et al. Scala-AM: A Modular Static Analysis Framework , 2016, 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM).
[13] Christopher Krügel,et al. Pixy: a static analysis tool for detecting Web application vulnerabilities , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[14] Carolyn L. Talcott,et al. A foundation for actor computation , 1997, Journal of Functional Programming.
[15] Marco Pistoia,et al. Saving the world wide web from vulnerable JavaScript , 2011, ISSTA '11.
[16] Olin Shivers,et al. Control-flow analysis of higher-order languages of taming lambda , 1991 .
[17] Ben Hardekopf,et al. JSAI: a static analysis platform for JavaScript , 2014, SIGSOFT FSE.
[18] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[19] C. Papadimitriou,et al. Introduction to the Theory of Computation , 2018 .
[20] David B. Whalley,et al. Avoiding conditional branches by code replication , 1995, PLDI '95.