Abstract is missing.
- Using targeted symbolic execution for reducing false-positives in dataflow analysis Steven Arzt, Siegfried Rasthofer, Robert Hahn, Eric Bodden. 1-6 [doi]
- Understanding caller-sensitive method vulnerabilities: a class of access control vulnerabilities in the Java platformCristina Cifuentes, Andrew Gross, Nathan Keynes. 7-12 [doi]
- Combining type-analysis with points-to analysis for analyzing Java library source-codeNicholas Allen, Padmanabhan Krishnan, Bernhard Scholz. 13-18 [doi]
- Droidel: a general approach to Android framework modelingSam Blackshear, Alexandra Gendreau, Bor-Yuh Evan Chang. 19-25 [doi]
- Design your analysis: a case study on implementation reusability of data-flow functionsJohannes Lerch, Ben Hermann. 26-30 [doi]