BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
analysi (13)
dynam (6)
applic (5)
use (5)
flow (5)

Stem taint$ (all stems)

24 papers:

SANERSANER-2015-LaverdiereBM #analysis #composition #graph #using
Taint analysis of manual service compositions using Cross-Application Call Graphs (MAL, BJB, EM), pp. 585–589.
SCAMSCAM-2015-BlazyRS #obfuscation
Data tainting and obfuscation: Improving plausibility of incorrect taint (SB, SR, TS), pp. 111–120.
ISSTAISSTA-2015-HuangDMD #analysis #android #precise #scalability
Scalable and precise taint analysis for Android (WH, YD, AM, JD), pp. 106–117.
DATEDATE-2014-SubramanyanA #design #security #verification
Formal verification of taint-propagation security properties in a commercial SoC design (PS, DA), pp. 1–2.
FASEFASE-2014-HuangDM #analysis #java #type system #web
Type-Based Taint Analysis for Java Web Applications (WH, YD, AM), pp. 140–154.
SCAMSCAM-2014-YadegariD #analysis
Bit-Level Taint Analysis (BY, SD), pp. 255–264.
PLDIPLDI-2014-ArztRFBBKTOM #analysis #android #named #precise
FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps (SA, SR, CF, EB, AB, JK, YLT, DO, PM), p. 29.
FSEFSE-2014-LerchHBM #analysis #named #performance #scalability
FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases (JL, BH, EB, MM), pp. 98–108.
ISSTAISSTA-2013-WeiR #analysis #javascript
Practical blended taint analysis for JavaScript (SW, BGR), pp. 336–346.
FSEFSE-2012-GanaiLG #analysis #concurrent #multi #named #source code #thread
DTAM: dynamic taint analysis of multi-threaded programs for relevancy (MKG, DL, AG), p. 46.
ICSTICST-2012-BekrarBGM #approach #fuzzing
A Taint Based Approach for Smart Fuzzing (SB, CB, RG, LM), pp. 818–825.
OOPSLAOOPSLA-2011-SridharanAPGTB #analysis #named #web
F4F: taint analysis of framework-based web applications (MS, SA, MP, SG, OT, RB), pp. 1053–1068.
CCCC-2011-RimsadP #analysis #source code
Tainted Flow Analysis on e-SSA-Form Programs (AR, Md, FMQP), pp. 124–143.
ECOOPECOOP-2010-DhooliaMSS #debugging #using
Debugging Model-Transformation Failures Using Dynamic Tainting (PD, SM, VSS, SS), pp. 26–51.
OSDIOSDI-2010-EnckGCCJMS #data flow #monitoring #named #privacy #realtime #smarttech
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones (WE, PG, BGC, LPC, JJ, PM, AS), pp. 393–407.
PLDIPLDI-2009-TrippPFSW #analysis #effectiveness #named #web
TAJ: effective taint analysis of web applications (OT, MP, SJF, MS, OW), pp. 87–97.
ICSEICSE-2009-GaneshLR #fuzzing
Taint-based directed whitebox fuzzing (VG, TL, MCR), pp. 474–484.
ISSTAISSTA-2009-ClauseO #automation #identification #named #using
Penumbra: automatically identifying failure-relevant inputs using dynamic tainting (JAC, AO), pp. 249–260.
CGOCGO-2008-SaxenaSP #fine-grained #performance
Efficient fine-grained binary instrumentationwith applications to taint-tracking (PS, RS, VP), pp. 74–83.
HPCAHPCA-2008-VenkataramaniDSP #named #programmable
FlexiTaint: A programmable accelerator for dynamic taint propagation (GV, ID, YS, MP), pp. 173–184.
ASEASE-2007-ClauseDOP #effectiveness #memory management #using
Effective memory protection using dynamic tainting (JAC, ID, AO, MP), pp. 284–292.
ISSTAISSTA-2007-ClauseLO #analysis #framework #named
Dytan: a generic dynamic taint analysis framework (JAC, WL, AO), pp. 196–206.
FSEFSE-2006-HalfondOM #evaluation #injection #sql #using
Using positive tainting and syntax-aware evaluation to counter SQL injection attacks (WGJH, AO, PM), pp. 175–185.
ECOOPECOOP-2005-PistoiaFKS #analysis #detection #interprocedural
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection (MP, RJF, LK, VCS), pp. 362–386.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.