The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for taint with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2007 (20) 2008 (22) 2009 (16) 2010-2011 (24) 2012-2013 (22) 2014 (22) 2015 (21) 2016 (27) 2017 (16) 2018 (22) 2019 (29) 2020 (26) 2021 (38) 2022 (33) 2023 (33) 2024 (6)
Publication types (Num. hits)
article(100) data(1) incollection(2) inproceedings(268) phdthesis(6)
Venues (Conferences, Journals, ...)
CoRR(29) ICSE(9) ESEC/SIGSOFT FSE(8) ASE(7) CCS(7) ISSTA(7) ARES(6) Comput. Secur.(6) SCAM(6) EuroSys(5) MICRO(5) MPLR(5) SP(5) ACSAC(4) IEEE Symposium on Security and...(4) NDSS(4) More (+10 of total 212)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 108 occurrences of 70 keywords

Results
Found 377 publication records. Showing 377 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
124Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu Sridharan, Omri Weisman TAJ: effective taint analysis of web applications. Search on Bibsonomy PLDI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, java, static analysis, web application, program analysis, slicing, taint analysis
118Guru Venkataramani, Ioannis Doudalis, Yan Solihin, Milos Prvulovic FlexiTaint: A programmable accelerator for dynamic taint propagation. Search on Bibsonomy HPCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
107Prateek Saxena, R. Sekar 0001, Varun Puranik Efficient fine-grained binary instrumentationwith applications to taint-tracking. Search on Bibsonomy CGO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF binary analysis/rewriting, taint tracking, information flow
85Alex Ho, Michael A. Fetterman, Christopher Clark, Andrew Warfield, Steven Hand 0001 Practical taint-based protection using demand emulation. Search on Bibsonomy EuroSys The full citation details ... 2006 DBLP  DOI  BibTeX  RDF QEMU, demand emulation, false tainting, tainting, virtual machine, virtualization, emulation, Xen
83Walter Chang, Brandon Streiff, Calvin Lin Efficient and extensible security enforcement using dynamic data flow analysis. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security enforcement, static analysis, dynamic data flow analysis
83James A. Clause, Ioannis Doudalis, Alessandro Orso, Milos Prvulovic Effective memory protection using dynamic tainting. Search on Bibsonomy ASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF illegal memory accesses, hardware support, dynamic tainting
74Erika Chin, David A. Wagner 0001 Efficient character-level taint tracking for Java. Search on Bibsonomy SWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic taint tracking, java, web applications, information flow
68Hyung Chan Kim, Angelos D. Keromytis, Michael Covington, Ravi Sahita Capturing Information Flow with Concatenated Dynamic Taint Analysis. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
68Lorenzo Cavallaro, R. Sekar 0001 Anomalous Taint Detection. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
68Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 STILL: Exploit Code Detection via Static Taint and Initialization Analyses. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Vijay Ganesh, Tim Leek, Martin C. Rinard Taint-based directed whitebox fuzzing. Search on Bibsonomy ICSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
52Zhiwen Bai, Liming Wang, Jinglin Chen, Lin Xu, Jian Liu, Xiyang Liu DTAD: A Dynamic Taint Analysis Detector for Information Security. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52James A. Clause, Wanchun Li, Alessandro Orso Dytan: a generic dynamic taint analysis framework. Search on Bibsonomy ISSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information flow, general framework, dynamic tainting
52Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie 0001 Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou Improving software security via runtime instruction-level taint checking. Search on Bibsonomy ASID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF format string, hardware tagging, buffer overflow
50James Newsome, Stephen McCamant, Dawn Song Measuring channel capacity to distinguish undue influence. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF model counting, quantitative information flow, channel capacity
50Lorenzo Cavallaro, Prateek Saxena, R. Sekar 0001 On the Limits of Information Flow Techniques for Malware Analysis and Containment. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Zhiyong Shan, Qiuyue Wang, Xiaofeng Meng 0001 An OS Security Protection Model for Defeating Attacks from Network. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Access Control, information flow
41Edward J. Schwartz, Thanassis Avgerinos, David Brumley All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dynamic analysis, symbolic execution, taint analysis
39Tao Bao, Yunhui Zheng, Zhiqiang Lin, Xiangyu Zhang 0001, Dongyan Xu Strict control dependence and its effect on dynamic information flow analyses. Search on Bibsonomy ISSTA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dynamic information flow, strict control dependence, data dependence, control dependence, taint analysis
39Siliang Li, Gang Tan Finding bugs in exceptional situations of JNI programs. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF static analysis, taint analysis, java native interface
39Elizabeth Stinson, John C. Mitchell Characterizing Bots' Remote Control Behavior. Search on Bibsonomy Botnet Detection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF host-based, behavior-based, taint, interposition, detection, system call
39Ken Koster A state coverage tool for JUnit. Search on Bibsonomy ICSE Companion The full citation details ... 2008 DBLP  DOI  BibTeX  RDF coverage, unit testing, structural testing, test adequacy criteria, taint analysis, state coverage
39Christof Fetzer, Martin Süßkraut Switchblade: enforcing dynamic personalized system call models. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF system call interposition, system call models, security, taint analysis
39Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh Dynamic multi-process information flow tracking for web application security. Search on Bibsonomy Middleware (Demos and Posters) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dynamic checking compiler, SQL injection, cross-site scripting, web application security, taint analysis, information flow tracking
39Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna Static Detection of Vulnerabilities in x86 Executables. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF binary static analysis, symbolic execution, Vulnerability analysis, taint analysis
37John Galea, Daniel Kroening The Taint Rabbit: Optimizing Generic Taint Analysis with Dynamic Fast Path Generation. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
37John Galea, Daniel Kroening The Taint Rabbit: Optimizing Generic Taint Analysis with Dynamic Fast Path Generation. Search on Bibsonomy AsiaCCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
37Md. Imran Alam, Raju Halder, Harshita Goswami, Jorge Sousa Pinto K-Taint: An Executable Rewriting Logic Semantics for Taint Analysis in the K Framework. Search on Bibsonomy ENASE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
37Neville Grech, Yannis Smaragdakis P/Taint: unified points-to and taint analysis. Search on Bibsonomy Proc. ACM Program. Lang. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
37Hou Rui, Zhigang Jin, Baoliang Wang Investigation of taint analysis for Smartphone-implicit taint detection and privacy leakage detection. Search on Bibsonomy EURASIP J. Wirel. Commun. Netw. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
37Ruoyu Zhang, Shan Huang, Zhengwei Qi Efficient Taint Analysis with Taint Behavior Summary. Search on Bibsonomy CMC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
37Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Shuo Tang, Chris Grier, Onur Aciiçmez, Samuel T. King Alhambra: a system for creating, enforcing, and testing browser security policies. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF web browser, web security, cross-site scripting
33Haibo Chen 0001, Liwei Yuan, Xi Wu 0001, Binyu Zang, Bo Huang 0002, Pen-Chung Yew Control flow obfuscation with information flow tracking. Search on Bibsonomy MICRO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF control flow obfuscation, opaque predicate, information flow tracking, control speculation
33Georgios Portokalidis, Herbert Bos Eudaemon: involuntary and on-demand emulation against zero-day exploits. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, operating systems, honeypots
33Edmund B. Nightingale, Daniel Peek, Peter M. Chen, Jason Flinn Parallelizing security checks on commodity hardware. Search on Bibsonomy ASPLOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, performance, parallel, operating systems, speculative execution
33Karl Chen, David A. Wagner 0001 Large-scale analysis of format string vulnerabilities in Debian Linux. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF format string vulnerability, large-scale analysis, type-qualifier inference
22Dejan Baca Identifying Security Relevant Warnings from Static Code Analysis Tools through Code Tainting. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dua, security, data flow, coverity, Static code analysis, taint analysis, findbugs
22Tielei Wang, Tao Wei, Guofei Gu, Wei Zou TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dynamic taint analysis, symbolic execution, fuzzing
22Asia Slowinska, Herbert Bos Pointless tainting?: evaluating the practicality of pointer tainting. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic taint analysis, pointer tainting
22Rui Wang 0010, XiaoFeng Wang 0001, Kehuan Zhang, Zhuowei Li 0001 Towards automatic reverse engineering of software security configurations. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control, reverse engineering, configuration, context-free language, taint analysis
22Shvetank Jain, Fareha Shafique, Vladan Djeric, Ashvin Goel Application-level isolation and recovery with solitude. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF transactional file system, access control, file systems, recovery, taint analysis, copy-on-write
22Olatunji Ruwase, Phillip B. Gibbons, Todd C. Mowry, Vijaya Ramachandran, Shimin Chen, Michael Kozuch, Michael P. Ryan Parallelizing dynamic information flow tracking. Search on Bibsonomy SPAA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dynamic information flow tracking (dift), log-based monitoring, parallel algorithm, taint analysis, program monitoring
22Heng Yin 0001, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda Panorama: capturing system-wide information flow for malware detection and analysis. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dynamic taint analysis, spyware, malware detection, malware analysis
22Jeffrey S. Foster, Robert Johnson, John Kodumal, Alex Aiken Flow-insensitive type qualifiers. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF const, taint, security, static analysis, constraints, types, Type qualifiers
18François Hublet, David A. Basin, Srdan Krstic User-Controlled Privacy: Taint, Track, and Control. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Jiahui Xiang, Wenhai Wang, Tong Ye, Peiyu Liu 0003 LuaTaint: A Static Taint Analysis System for Web Interface Framework Vulnerability of IoT Devices. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Yiyu Zhang, Tianyi Liu, Yueyang Wang, Yun Qi, Kai Ji, Jian Tang, Xiaoliang Wang, Xuandong Li, Zhiqiang Zuo 0002 HardTaint: Production-Run Dynamic Taint Analysis via Selective Hardware Tracing. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Marcos Tileria, Jorge Blasco, Santanu Kumar Dash 0001 DocFlow: Extracting Taint Specifications from Software Documentation. Search on Bibsonomy ICSE The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Yifan Luo, Baojiang Cui Rev Gadget: A Java Deserialization Gadget Chains Discover Tool Based on Reverse Semantics and Taint Analysis. Search on Bibsonomy EIDWT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Huan Yu, Baojiang Cui IoTaint: An Optimized Static Taint Analysis Method in Embedded Firmware. Search on Bibsonomy EIDWT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Akashdeep Bhardwaj, Ankit Vishnoi, Salil Bharany, Abdelzahir Abdelmaboud, Ashraf Osman Ibrahim, Mohamed Mamoun, Wamda Nagmeldin Framework to perform taint analysis and security assessment of IoT devices in smart cities. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Abdalla Wasef Marashdih, Zarul Fitri Zaaba, Khaled Suwais An Enhanced Static Taint Analysis Approach to Detect Input Validation Vulnerability. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Bihuan Chen 0001, Yang Liu 0003, Xin Peng 0001, Yijian Wu, Shengchao Qin Baton: symphony of random testing and concolic testing through machine learning and taint analysis. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mikhail Shcherbakov, Paul Moosbrugger, Musard Balliu Unveiling the Invisible: Detection and Evaluation of Prototype Pollution Gadgets with Dynamic Taint Analysis. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Puzhuo Liu, Chengnian Sun, Yaowen Zheng, Xuan Feng, Chuan Qin, Yuncheng Wang, Zhi Li 0018, Limin Sun Harnessing the Power of LLM to Support Binary Taint Analysis. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yiu Wai Chow, Max Schäfer, Michael Pradel Beware of the Unexpected: Bimodal Taint Analysis. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Chenghua Tang, Zheng Du, Mengmeng Yang, Baohua Qiang Android static taint analysis based on multi branch search association. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Zhizhuang Jia, Chao Yang 0016, Xiaoyun Zhao, Xinghua Li 0001, Jian Feng Ma 0001 Design and implementation of an efficient container tag dynamic taint analysis. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ruipeng Wang, Kaixiang Chen, Zulie Pan, Yuwei Li, Qianyu Li, Yang Li, Min Zhang, Chao Zhang 0008 Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Cong Sun 0001, Yuwan Ma, Dongrui Zeng, Gang Tan, Siqi Ma, Yafei Wu μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Xiangyu Wu, Xuehui Du, Qiantao Yang, Aodi Liu, Na Wang, Wenjuan Wang TaintGuard: Preventing implicit privilege leakage in smart contract based on taint tracking at abstract syntax tree level. Search on Bibsonomy J. Syst. Archit. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Prakash Neupane, Manas Thakur Variational Study of the Impact of Call Graphs on Precision of Android Taint Analysis. Search on Bibsonomy ISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Long Gao, Yiru Zhao, Qihan Wan, Lei Zhao Efficient Hybrid Fuzzing with Syntax-aware Input Trim Based on Lightweight Taint Analysis. Search on Bibsonomy ISPA/BDCloud/SocialCom/SustainCom The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Stefan Schott, Felix Pauck GenBenchDroid: Fuzzing Android Taint Analysis Benchmarks. Search on Bibsonomy Software Engineering The full citation details ... 2023 DBLP  BibTeX  RDF
18Rulin Xu, Xiaoguang Mao, Luohui Chen P-DATA: A Task-Level Parallel Framework for Dependency-Aware Value Flow Taint Analysis. Search on Bibsonomy APSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Siddharth Muralee, Igibek Koishybayev, Aleksandr Nahapetyan, Greg Tystahl, Bradley Reaves, Antonio Bianchi, William Enck, Alexandros Kapravelos, Aravind Machiry ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
18Yang Chen, Jianfeng Jiang, Shoumeng Yan, Hui Xu Mind Your Enclave Pointers! Detecting Privacy Leaks for SGX Apps via Sparse Taint Analysis. Search on Bibsonomy ISSRE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Subarno Banerjee, Siwei Cui, Michael Emmi, Antonio Filieri, Liana Hadarean, Peixuan Li, Linghui Luo, Goran Piskachev, Nicolás Rosner, Aritra Sengupta, Omer Tripp, Jingbo Wang Compositional Taint Analysis for Enforcing Security Policies at Scale. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Khaled Ahmed 0004, Yingying Wang, Mieszko Lis, Julia Rubin ViaLin: Path-Aware Dynamic Taint Analysis for Android. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Muhammad Monir Hossain, Nusrat Farzana Dipu, Kimia Zamiri Azar, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor TaintFuzzer: SoC Security Verification using Taint Inference-enabled Fuzzing. Search on Bibsonomy ICCAD The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ying Zhang, Bo Yu FirmCVI: Taint Analysis-Based Component Version Identification Method for Large-Scale IoT Firmware. Search on Bibsonomy ICPADS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yiu Wai Chow, Max Schäfer, Michael Pradel Beware of the Unexpected: Bimodal Taint Analysis. Search on Bibsonomy ISSTA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Zihao Wang, Pei Wang 0007, Qinkun Bao, Dinghao Wu Source Code Implied Language Structure Abstraction through Backward Taint Analysis. Search on Bibsonomy ICSOFT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yixiao Yang, Chen Gao, Zhiqi Li, Yifan Wang, Rui Wang Binary Level Concolic Execution on Windows with Rich Instrumentation Based Taint Analysis. Search on Bibsonomy SETTA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yujiang Gui, Dongjie He, Jingling Xue Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equivalent Value Flows. Search on Bibsonomy ASE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Teng Wang 0004, Haochen He, Xiaodong Liu 0004, Shanshan Li 0001, Zhouyang Jia, Yu Jiang, Qing Liao 0001, Wang Li 0003 ConfTainter: Static Taint Analysis For Configuration Options. Search on Bibsonomy ASE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mingqing Kang, Yichao Xu, Song Li 0006, Rigel Gjomemo, Jianwei Hou, V. N. Venkatakrishnan, Yinzhi Cao Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Zexin Zhong, Jiangchao Liu, Diyu Wu, Peng Di, Yulei Sui, Alex X. Liu, John C. S. Lui Scalable Compositional Static Taint Analysis for Sensitive Data Tracing on Industrial Micro-Services. Search on Bibsonomy ICSE-SEIP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Chao Wang, Ronny Ko, Yue Zhang 0025, Yuqing Yang 0003, Zhiqiang Lin Taintmini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis. Search on Bibsonomy ICSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yicheng Ouyang, Kailai Shao, Kunqiu Chen, Ruobing Shen, Chao Chen, Mingze Xu, Yuqun Zhang, Lingming Zhang 0001 MirrorTaint: Practical Non-intrusive Dynamic Taint Tracking for JVM-based Microservice Systems. Search on Bibsonomy ICSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Jianjia Yu, Zifeng Kang, Yinzhi Cao MiniTaintDev: Unveiling Mini-App Vulnerabilities through Dynamic Taint Analysis. Search on Bibsonomy SaTS@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Puzhuo Liu, Yaowen Zheng, Chengnian Sun, Chuan Qin, Dongliang Fang, Mingdong Liu, Limin Sun FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware. Search on Bibsonomy ASPLOS (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Malte Mues The integration of multi-color taint-analysis with dynamic symbolic execution for Java web application security analysis. Search on Bibsonomy 2023   RDF
18Hiroki Inayoshi, Shohei Kakei, Eiji Takimoto, Koichi Mouri, Shoichi Saito Value-utilized taint propagation: toward precise detection of apps' information flows across Android API calls. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Rongkuan Ma, Hao Zheng, Jingyi Wang, Mufeng Wang, Qiang Wei, Qingxian Wang Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis. Search on Bibsonomy Frontiers Inf. Technol. Electron. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Goran Piskachev, Johannes Späth, Ingo Budde, Eric Bodden Fluently specifying taint-flow queries with fluentTQL. Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Linghui Luo, Felix Pauck, Goran Piskachev, Manuel Benz, Ivan Pashchenko, Martin Mory, Eric Bodden, Ben Hermann 0001, Fabio Massacci TaintBench: Automatic real-world malware benchmarking of Android taint analyses. Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Linghui Luo Improving Real-World Applicability of Static Taint Analysis. Search on Bibsonomy Softwaretechnik-Trends The full citation details ... 2022 DBLP  BibTeX  RDF
18Gen Zhang, Peng-Fei Wang 0010, Tai Yue, Xiangdong Kong, Xu Zhou, Kai Lu ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Junbin Zhang 0002, Yingying Wang, Lina Qiu, Julia Rubin Analyzing Android Taint Analysis Tools: FlowDroid, Amandroid, and DroidSafe. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Ranjith Krishnamurthy, Goran Piskachev, Eric Bodden To what extent can we analyze Kotlin programs using existing Java taint analysis tools? (Extended Version) Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Goran Piskachev, Johannes Späth, Ingo Budde, Eric Bodden Fluently specifying taint-flow queries with fluentTQL. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Hossam ElAtali, Lachlan J. Gunn, Hans Liljestrand, N. Asokan BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Yang Chen, Jianfeng Jiang, Shoumeng Yan, Hui Xu STELLA: Sparse Taint Analysis for Enclave Leakage Detection. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Katherine Hough, Jonathan Bell 0001 A Practical Approach for Dynamic Taint Tracking with Control-flow Relationships. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Jacob Kreindl, Daniele Bonetta, David Leopoldseder, Lukas Stadler, Hanspeter Mössenböck Polyglot, Label-Defined Dynamic Taint Analysis in TruffleTaint. Search on Bibsonomy MPLR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Jacob Kreindl, Daniele Bonetta, Lukas Stadler, David Leopoldseder, Hanspeter Mössenböck Dynamic Taint Analysis with Label-Defined Semantics. Search on Bibsonomy MPLR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Dong Wang, Yu Gao 0002, Wensheng Dou, Jun Wei 0001 DisTA: Generic Dynamic Taint Tracking for Java-Based Distributed Systems. Search on Bibsonomy DSN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 377 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license