Comparative analysis of two approaches to the static taint analysis
https://doi.org/10.15514/ISPRAS-2017-29(3)-7
Abstract
About the Authors
M. V. BelyaevRussian Federation
N. V. Shimchik
Russian Federation
V. N. Ignatyev
Russian Federation
A. A. Belevantsev
Russian Federation
References
1. Reps T., Horwitz S., Sagiv M. Precise Interprocedural Dataflow Analysis via Graph Reachability. Proceedings of the 22Nd ACM SIGPLANSIGACT Symposium on Principles of Programming Languages (POPL ’95), San Francisco, California, USA, ACM, 1995, pp. 49-61
2. Koshelev V.K., Ignatyev V.N., Borzilov A.I. C# static analysis framework. Trudy ISP RAN/Proc. ISP RAS, vol. 28, issue 1, 2016, pp. 21-40 (in Russian). DOI:10.15514/ISPRAS-2016-28(1)-2
3. V. Koshelev, I. Dudina, V. Ignatyev, A. Borzilov. Path-sensitive bug detection analysis of C# program illustrated by null pointer dereference. Trudy ISP RАN / Proc ISP RAS, vol. 27, issue 5, 2015. pp.59-86 (in Russian). DOI: 10.15514/ISPRAS-2015-27(5)-5
4. FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycleaware Taint Analysis for Android Apps. Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI ’14), Edinburgh, United Kingdom, ACM, 2014, pp. 259-269
5. Christian Fritz et al. Highly Precise Taint Analysis for Android Applications. Tech. rep. EC SPRIDE, May 2013, 14 p. http://www.bodden.de/pubs/TUD-CS-2013-0113.pdf, дата обращения 20.06.2017
Review
For citations:
Belyaev M.V., Shimchik N.V., Ignatyev V.N., Belevantsev A.A. Comparative analysis of two approaches to the static taint analysis. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2017;29(3):99-116. (In Russ.) https://doi.org/10.15514/ISPRAS-2017-29(3)-7