Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 220 matches
- 2024
- Yifan Luo, Baojiang Cui:
Rev Gadget: A Java Deserialization Gadget Chains Discover Tool Based on Reverse Semantics and Taint Analysis. EIDWT 2024: 229-240 - Huan Yu, Baojiang Cui:
IoTaint: An Optimized Static Taint Analysis Method in Embedded Firmware. EIDWT 2024: 118-129 - Jiahui Xiang, Wenhai Wang, Tong Ye, Peiyu Liu:
LuaTaint: A Static Taint Analysis System for Web Interface Framework Vulnerability of IoT Devices. CoRR abs/2402.16043 (2024) - Yiyu Zhang, Tianyi Liu, Yueyang Wang, Yun Qi, Kai Ji, Jian Tang, Xiaoliang Wang, Xuandong Li, Zhiqiang Zuo:
HardTaint: Production-Run Dynamic Taint Analysis via Selective Hardware Tracing. CoRR abs/2402.17241 (2024) - Rahul Gopinath, Philipp Görz:
Mutation Analysis with Execution Taints. CoRR abs/2403.01146 (2024) - 2023
- Malte Mues:
The integration of multi-color taint-analysis with dynamic symbolic execution for Java web application security analysis. Technical University of Dortmund, Germany, 2023 - Bihuan Chen, Yang Liu, Xin Peng, Yijian Wu, Shengchao Qin:
Baton: symphony of random testing and concolic testing through machine learning and taint analysis. Sci. China Inf. Sci. 66(3) (2023) - Zhizhuang Jia, Chao Yang, Xiaoyun Zhao, Xinghua Li, Jian Feng Ma:
Design and implementation of an efficient container tag dynamic taint analysis. Comput. Secur. 135: 103528 (2023) - Chenghua Tang, Zheng Du, Mengmeng Yang, Baohua Qiang:
Android static taint analysis based on multi branch search association. Comput. Secur. 129: 103186 (2023) - Abdalla Wasef Marashdih, Zarul Fitri Zaaba, Khaled Suwais:
An Enhanced Static Taint Analysis Approach to Detect Input Validation Vulnerability. J. King Saud Univ. Comput. Inf. Sci. 35(2): 682-701 (2023) - Akashdeep Bhardwaj, Ankit Vishnoi, Salil Bharany, Abdelzahir Abdelmaboud, Ashraf Osman Ibrahim, Mohamed Mamoun, Wamda Nagmeldin:
Framework to perform taint analysis and security assessment of IoT devices in smart cities. PeerJ Comput. Sci. 9: e1771 (2023) - Cong Sun, Yuwan Ma, Dongrui Zeng, Gang Tan, Siqi Ma, Yafei Wu:
μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code. IEEE Trans. Dependable Secur. Comput. 20(2): 1461-1475 (2023) - Rulin Xu, Xiaoguang Mao, Luohui Chen:
P-DATA: A Task-Level Parallel Framework for Dependency-Aware Value Flow Taint Analysis. APSEC 2023: 249-258 - Puzhuo Liu, Yaowen Zheng, Chengnian Sun, Chuan Qin, Dongliang Fang, Mingdong Liu, Limin Sun:
FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware. ASPLOS (4) 2023: 138-152 - Long Gao, Yiru Zhao, Qihan Wan, Lei Zhao:
Efficient Hybrid Fuzzing with Syntax-aware Input Trim Based on Lightweight Taint Analysis. ISPA/BDCloud/SocialCom/SustainCom 2023: 508-515 - Ying Zhang, Bo Yu:
FirmCVI: Taint Analysis-Based Component Version Identification Method for Large-Scale IoT Firmware. ICPADS 2023: 920-927 - Chao Wang, Ronny Ko, Yue Zhang, Yuqing Yang, Zhiqiang Lin:
Taintmini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis. ICSE 2023: 932-944 - Zexin Zhong, Jiangchao Liu, Diyu Wu, Peng Di, Yulei Sui, Alex X. Liu, John C. S. Lui:
Scalable Compositional Static Taint Analysis for Sensitive Data Tracing on Industrial Micro-Services. ICSE-SEIP 2023: 110-121 - Zihao Wang, Pei Wang, Qinkun Bao, Dinghao Wu:
Source Code Implied Language Structure Abstraction through Backward Taint Analysis. ICSOFT 2023: 564-571 - Prakash Neupane, Manas Thakur:
Variational Study of the Impact of Call Graphs on Precision of Android Taint Analysis. ISEC 2023: 21:1-21:5 - Yang Chen, Jianfeng Jiang, Shoumeng Yan, Hui Xu:
Mind Your Enclave Pointers! Detecting Privacy Leaks for SGX Apps via Sparse Taint Analysis. ISSRE 2023: 24-35 - Yiu Wai Chow, Max Schäfer, Michael Pradel:
Beware of the Unexpected: Bimodal Taint Analysis. ISSTA 2023: 211-222 - Yujiang Gui, Dongjie He, Jingling Xue:
Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equivalent Value Flows. ASE 2023: 319-331 - Teng Wang, Haochen He, Xiaodong Liu, Shanshan Li, Zhouyang Jia, Yu Jiang, Qing Liao, Wang Li:
ConfTainter: Static Taint Analysis For Configuration Options. ASE 2023: 1640-1651 - Jianjia Yu, Zifeng Kang, Yinzhi Cao:
MiniTaintDev: Unveiling Mini-App Vulnerabilities through Dynamic Taint Analysis. SaTS@CCS 2023: 41-45 - Stefan Schott, Felix Pauck:
GenBenchDroid: Fuzzing Android Taint Analysis Benchmarks. Software Engineering 2023: 107-108 - Yixiao Yang, Chen Gao, Zhiqi Li, Yifan Wang, Rui Wang:
Binary Level Concolic Execution on Windows with Rich Instrumentation Based Taint Analysis. SETTA 2023: 351-367 - Khaled Ahmed, Yingying Wang, Mieszko Lis, Julia Rubin:
ViaLin: Path-Aware Dynamic Taint Analysis for Android. ESEC/SIGSOFT FSE 2023: 1598-1610 - Subarno Banerjee, Siwei Cui, Michael Emmi, Antonio Filieri, Liana Hadarean, Peixuan Li, Linghui Luo, Goran Piskachev, Nicolás Rosner, Aritra Sengupta, Omer Tripp, Jingbo Wang:
Compositional Taint Analysis for Enforcing Security Policies at Scale. ESEC/SIGSOFT FSE 2023: 1985-1996 - Siddharth Muralee, Igibek Koishybayev, Aleksandr Nahapetyan, Greg Tystahl, Bradley Reaves, Antonio Bianchi, William Enck, Alexandros Kapravelos, Aravind Machiry:
ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions. USENIX Security Symposium 2023: 6983-7000
skipping 190 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 14:52 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint