Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
Special pages
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

\textsf{BackFlow}: backward context-sensitive flow reconstruction of taint analysis results

From MaRDI portal
Publication:784106
Jump to:navigation, search

DOI10.1007/978-3-030-39322-9_2OpenAlexW3000272901MaRDI QIDQ784106FDOQ784106


Authors: Pietro Ferrara, Luca Olivieri, Fausto Spoto Edit this on Wikidata


Publication date: 5 August 2020


Full work available at URL: https://doi.org/10.1007/978-3-030-39322-9_2




Recommendations

  • Boolean formulas for the static identification of injection attacks in Java
  • Efficient static checker for tainted variable attacks
  • Information-flow and data-flow analysis of while-programs
  • Implicit flows in malicious and nonmalicious code
  • Static evidences for attack reconstruction


Mathematics Subject Classification ID

Specification and verification (program logics, model checking, etc.) (68Q60)



Cited In (1)

  • BackFlow

Uses Software

  • JFlow
  • Panorama
  • Pixy
  • TaintDroid
  • FlowDroid
  • Julia Static Analyzer
  • F4F
  • Dytan
  • TAJ
  • MorphDroid
  • Aletheia
  • Sails





This page was built for publication: \textsf{BackFlow}: backward context-sensitive flow reconstruction of taint analysis results

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q784106)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:784106&oldid=12712391"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 30 January 2024, at 11:04. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki