2018
DOI: 10.1134/s036176881806004x
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of Two Approaches to Static Taint Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…We propose an analogical combination of two static analyses: IFDS-based analysis and symbolic execution. Unlike building taint analysis using static symbolic execution without IFDS framework, as we have already done for C# in [5], or as it is done for C and C++ in Svace [9], two-staged approach allows to deal with following issues. Every general-purpose static analyzer is required to balance between analysis precision and performance.…”
Section: Analysis Results Refinement Stagementioning
confidence: 99%
See 1 more Smart Citation
“…We propose an analogical combination of two static analyses: IFDS-based analysis and symbolic execution. Unlike building taint analysis using static symbolic execution without IFDS framework, as we have already done for C# in [5], or as it is done for C and C++ in Svace [9], two-staged approach allows to deal with following issues. Every general-purpose static analyzer is required to balance between analysis precision and performance.…”
Section: Analysis Results Refinement Stagementioning
confidence: 99%
“…But this approach requires to gather constraints for these offsets using LLVM-instructions which are usually ignored by the IFDS engine, because values of these variables are not tainted. Therefore, it's better to build a dedicated symbolic execution engine and integrate it with existing IFDS engine or to build taint analysis immediately on symbolic execution [5]. Because of this we decided to use an existing symbolic execution tool as a second analysis stage.…”
Section: Memory Modelmentioning
confidence: 99%
“…Others have extended Java-based abstract interpretation frameworks to run precise data flow analysis on Android [34], or have focused on model checking for data flow properties [35], [36]. Taint tracking and symbolic execution can achieve the same degree of completeness, and neither approach offers superior performance in general [37]. In an attempt to combine the different approaches, work has been done to post-process taint tracking results using symbolic execution [38].…”
Section: Re L a T E D Wo R Kmentioning
confidence: 99%
“…This disadvantage is important especially for using SharpChecker with small projects. Such modeling is very significant for taint analysis engine [5], because it makes it possible to specify paths of tainted data propagation and cleanup between arguments, object fields and return value. The described approach seems to have an evident extension.…”
Section: Code Modelsmentioning
confidence: 99%
“…This paper is devoted to the possible methods for data provision that were tested with the static analysis tool SharpChecker [1], which is also available as a part of Svace [2], [3] static analyzer tool-set. SharpChecker contains several analysis engines: AST, dataflow, symbolic execution [4], taint [5] and experimental machine learning based subsystem [6]. Modeling of external libraries code is an important task in interprocedural source code analysis.…”
Section: Introductionmentioning
confidence: 99%