This is the artifact package of the ICST 2023 paper Model Generation For Java Frameworks by Linghui Luo, Goran Piskachev, Ranjith Krishnamurthy, Julian Dolby, Eric Bodden, Martin Schäf Paper abstract: Modern applications often rely on rich frameworks to provide functionality. Android, for instance, handles many aspects of building a mobile app. But these frameworks also have costs. Given the importance of application security and tools to ensure it, one major cost is that framework complicate tools based on static analysis: (1) They hurt analysis quality by including large amounts of complex, dynamic, and native library code. (2) Frameworks like Android become the main program, making whole program analysis the app problematic. Mechanis...
Abstract—We present a technique to mine explicit information flow specifications from concrete execu...
Today’s mobile applications deliver complex functionalities on the Google’s Android platform. This u...
Security of modern applications is oftentimes flawed due to incorrect usage of cryptographic APIs. R...
The majority of static analysis tools focus on generating the call graph of the whole program (i.e.,...
This artifact contains the evaluation benchmarks for the paper "Static Analysis of Java Enterprise A...
We present an approach and tool for general-purpose modeling of Android for static analysis. Our app...
International audienceNative code is now commonplace within Android app packages where it co-exists ...
As feature-rich Android applications (apps for short) are increasingly popularized in security-sensi...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
This dissertation presents a new approach to static analysis for security vetting of Android apps, a...
Context: Static analysis exploits techniques that parse program source code or bytecode, often trave...
Due to the quality and security requirements that come with an always-on mobile device processing la...
Context: Android is a programming language based on Java and an operating system for embedded and mo...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
This is the artifact of paper "Tai-e: A Developer-Friendly Static Analysis Framework for Java by Har...
Abstract—We present a technique to mine explicit information flow specifications from concrete execu...
Today’s mobile applications deliver complex functionalities on the Google’s Android platform. This u...
Security of modern applications is oftentimes flawed due to incorrect usage of cryptographic APIs. R...
The majority of static analysis tools focus on generating the call graph of the whole program (i.e.,...
This artifact contains the evaluation benchmarks for the paper "Static Analysis of Java Enterprise A...
We present an approach and tool for general-purpose modeling of Android for static analysis. Our app...
International audienceNative code is now commonplace within Android app packages where it co-exists ...
As feature-rich Android applications (apps for short) are increasingly popularized in security-sensi...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
This dissertation presents a new approach to static analysis for security vetting of Android apps, a...
Context: Static analysis exploits techniques that parse program source code or bytecode, often trave...
Due to the quality and security requirements that come with an always-on mobile device processing la...
Context: Android is a programming language based on Java and an operating system for embedded and mo...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
This is the artifact of paper "Tai-e: A Developer-Friendly Static Analysis Framework for Java by Har...
Abstract—We present a technique to mine explicit information flow specifications from concrete execu...
Today’s mobile applications deliver complex functionalities on the Google’s Android platform. This u...
Security of modern applications is oftentimes flawed due to incorrect usage of cryptographic APIs. R...