
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 136 matches
- 2021
- Manuel Benz, Erik Krogh Kristensen, Linghui Luo, Nataniel P. Borges Jr., Eric Bodden, Andreas Zeller:
Heaps'n Leaks: How Heap Snapshots Improve Android Taint Analysis. Software Engineering 2021: 23-26 - 2020
- Mohammadreza Ashouri:
TainTrap: a hybrid technique for vulnerability analysis in java. University of Potsdam, Germany, 2020, pp. 1-103 - T. D. Ovasapyan, P. V. Knyazev, Dmitry A. Moskvin:
Application of Taint Analysis to Study the Safety of Software of the Internet of Things Devices Based on the ARM Architecture. Autom. Control. Comput. Sci. 54(8): 834-840 (2020) - Wei You
, Bin Liang
, Wenchang Shi
, Peng Wang, Xiangyu Zhang:
TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices. IEEE Trans. Dependable Secur. Comput. 17(1): 209-222 (2020) - Rezwana Karim, Frank Tip
, Alena Sochurková, Koushik Sen:
Platform-Independent Dynamic Taint Analysis for JavaScript. IEEE Trans. Software Eng. 46(12): 1364-1379 (2020) - John Galea, Daniel Kroening:
The Taint Rabbit: Optimizing Generic Taint Analysis with Dynamic Fast Path Generation. AsiaCCS 2020: 622-636 - Manuel Benz, Erik Krogh Kristensen, Linghui Luo, Nataniel P. Borges, Eric Bodden, Andreas Zeller:
Heaps'n leaks: how heap snapshots improve Android taint analysis. ICSE 2020: 1061-1072 - Xiaoqin Fu, Haipeng Cai:
Scaling application-level dynamic taint analysis to enterprise-scale distributed systems. ICSE (Companion Volume) 2020: 270-271 - Jacob Kreindl, Daniele Bonetta, Lukas Stadler, David Leopoldseder, Hanspeter Mössenböck:
Multi-language dynamic taint analysis in a polyglot virtual machine. MPLR 2020: 15-29 - Florian D. Loch, Martin Johns, Martin Hecker, Martin Mohr, Gregor Snelting:
Hybrid taint analysis for Java EE. SAC 2020: 1716-1725 - Amit Kr Mandal, Pietro Ferrara, Yuliy Khlyebnikov, Agostino Cortesi
, Fausto Spoto:
Cross-program taint analysis for IoT systems. SAC 2020: 1944-1952 - Felix Pauck, Eric Bodden, Heike Wehrheim:
Reproducing Taint-Analysis Results with ReproDroid. SE 2020: 123-124 - Jie Wang, Yunguang Wu, Gang Zhou, Yiming Yu, Zhenyu Guo, Yingfei Xiong:
Scaling static taint analysis to industrial SOA applications: a case study at Alibaba. ESEC/SIGSOFT FSE 2020: 1477-1486 - D. M. Lyons, S. Zahra:
Using Taint Analysis and Reinforcement Learning (TARL) to Repair Autonomous Robot Software. SP Workshops 2020: 181-184 - Dongdong She, Yizheng Chen, Abhishek Shah, Baishakhi Ray, Suman Jana:
Neutaint: Efficient Dynamic Taint Analysis with Neural Networks. IEEE Symposium on Security and Privacy 2020: 1527-1543 - Pietro Ferrara, Luca Olivieri, Fausto Spoto:
BackFlow: Backward Context-Sensitive Flow Reconstruction of Taint Analysis Results. VMCAI 2020: 23-43 - D. M. Lyons, S. Zahra:
Using Taint Analysis and Reinforcement Learning (TARL) to Repair Autonomous Robot Software. CoRR abs/2005.03813 (2020) - John Galea, Daniel Kroening:
The Taint Rabbit: Optimizing Generic Taint Analysis with Dynamic Fast Path Generation. CoRR abs/2007.05955 (2020) - 2019
- Yuzhu Ren
, Weiyu Dong
, Jian Lin
, Xinliang Miao
:
A Dynamic Taint Analysis Framework Based on Entity Equipment. IEEE Access 7: 186308-186318 (2019) - Pietro Ferrara, Amit Kr Mandal, Agostino Cortesi
, Fausto Spoto:
Cross-Programming Language Taint Analysis for the IoT Ecosystem. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 77 (2019) - Yuhei Kawakoya, Eitaro Shioji, Makoto Iwamura, Jun Miyoshi:
API Chaser: Taint-Assisted Sandbox for Evasive Malware Analysis. J. Inf. Process. 27: 297-314 (2019) - Wontae Choi, Jayanthkumar Kannan, Domagoj Babic:
A scalable, flow-and-context-sensitive taint analysis of android applications. J. Comput. Lang. 51: 1-14 (2019) - Jie Zhang, Cong Tian, Zhenhua Duan:
FastDroid: efficient taint analysis for Android applications. ICSE (Companion Volume) 2019: 236-237 - Ciprian Paduraru, Marius-Constantin Melemciuc, Bogdan Ghimis:
Fuzz Testing with Dynamic Taint Analysis based Tools for Faster Code Coverage. ICSOFT 2019: 82-93 - Dongjie He, Haofeng Li, Lei Wang, Haining Meng, Hengjie Zheng, Jie Liu, Shuangwei Hu, Lian Li, Jingling Xue:
Performance-Boosting Sparsification of the IFDS Algorithm with Applications to Taint Analysis. ASE 2019: 267-279 - Linghui Luo, Eric Bodden, Johannes Späth:
A Qualitative Analysis of Android Taint-Analysis Results. ASE 2019: 102-114 - Yongjian Hu, Oriana Riva, Suman Nath, Iulian Neamtiu:
Elix: Path-Selective Taint Analysis for Extracting Mobile App Links. MobiSys 2019: 193-206 - Jacob Kreindl, Daniele Bonetta, Hanspeter Mössenböck:
Towards efficient, multi-language dynamic taint analysis. MPLR 2019: 85-94 - Ali Davanian, Zhenxiao Qi, Yu Qu, Heng Yin:
DECAF++: Elastic Whole-System Dynamic Taint Analysis. RAID 2019: 31-45 - Xiaoqin Fu:
On the scalable dynamic taint analysis for distributed systems. ESEC/SIGSOFT FSE 2019: 1247-1249
skipping 106 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-02-26 10:37 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint