2015
DOI: 10.1145/2829988.2790003
|View full text |Cite
|
Sign up to set email alerts
|

Extractocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…In order to extract the Jimple slices, we implement a forward and backward slicing algorithm (see Appendix A), which are based on the networkaware program slicing approach proposed by Choi et al [29,30]. The slicing algorithm works bidirectionally based on the ICFG constructed in the previous step.…”
Section: Program Slicermentioning
confidence: 99%
See 1 more Smart Citation
“…In order to extract the Jimple slices, we implement a forward and backward slicing algorithm (see Appendix A), which are based on the networkaware program slicing approach proposed by Choi et al [29,30]. The slicing algorithm works bidirectionally based on the ICFG constructed in the previous step.…”
Section: Program Slicermentioning
confidence: 99%
“…In this case, a dependency exists between responseA and requestB. To identify this, we leverage the taint-based approach proposed by Choi et al [29,30], in which the dependency is determined by identifying the data flow from the source (line (1) in responseA) to the sink (line (1) in requestB). Finally, the program slicer records Jimple slices consisting of HTTP request/response and its dependencies for the next step, in which code snippets meeting the three conditions for vulnerability to remote code injection attacks are identified.…”
Section: Fileoutputstreamwrite()mentioning
confidence: 99%