FlowDroid
From MaRDI portal
Cited in
(55)- EviCheck: Digital Evidence for Android
- Software Model Checking for Mobile Security – Collusion Detection in $$\mathbb {K}$$K
- MCGP
- WALA
- DaCapo
- Soot
- Fugue
- Clara
- SPLLIFT
- Jimple
- JFlow
- FlashRelate
- FlashExtract
- Panorama
- Pixy
- TaintDroid
- Julia Static Analyzer
- F4F
- Code Virtualizer
- BinSim
- Capstone
- DynOpVm
- Dytan
- memslap
- NISLVMP
- pyftpdlib
- ReWolf
- SEEAD
- PQL
- Themida
- VOT4CS
- VMProtect
- VMGuard
- VMAttack
- VMHunt
- DREBIN
- Dava
- TAJ
- Aletheia
- BackFlow
- MorphDroid
- Sails
- GenMul
- multgen
- EMBER
- IncA
- Androguard
- AppGuard
- Apposcopy
- EviCheck
- Static detection of DoS vulnerabilities in programs that use regular expressions
- \textsf{BackFlow}: backward context-sensitive flow reconstruction of taint analysis results
- DynOpVm: VM-based software obfuscation with dynamic opcode mapping
- Automatic synthesis of data-flow analyzers
- BoSy
This page was built for software: FlowDroid