2017
DOI: 10.1201/9780849332517
|View full text |Cite
|
Sign up to set email alerts
|

Data Flow Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 66 publications
(7 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…The idea is to apply traditional liveness analysis [11] to identify at each program point which variables contain values that may be needed later. This is applied as a backward analysis on the control flow graph where liveness is introduced at points where a variable is used and propagated backwards with unions being taken at merge points.…”
Section: Free-me Analysismentioning
confidence: 99%
“…The idea is to apply traditional liveness analysis [11] to identify at each program point which variables contain values that may be needed later. This is applied as a backward analysis on the control flow graph where liveness is introduced at points where a variable is used and propagated backwards with unions being taken at merge points.…”
Section: Free-me Analysismentioning
confidence: 99%
“…1) Unrestricted Context Depth: Our symbolic execution engine (see ❷ in Figure 4) performs an inter-procedural pathsensitive analysis with a call string approach [71,72]. For each function a CFG is built.…”
Section: B Symbolic Execution Engine Featuresmentioning
confidence: 99%
“…Mimicry attacks [3] refer to attackers using legitimate execution call sequences to achieve attack goals by modifying parameters within the called function. Techniques such as parameter discovery [4] or data flow analysis [5] can be used to detect these attacks. However, it is difficult to ensure full coverage of all input parameters in the application program, and the parameter discovery process is tedious and time-consuming.…”
Section: Introductionmentioning
confidence: 99%