2019
DOI: 10.1007/978-3-030-21548-4_27
|View full text |Cite
|
Sign up to set email alerts
|

Practical Dynamic Taint Tracking for Exploiting Input Sanitization Error in Java Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…The results of the study shows that existing vulnerability detection tools for Android apps are very limited in their ability to detect known vulnerabilities. Ashouri 28 evaluated the bug detection capabilities of three static analysis tools, namely, YASCA, CAT.NET, and Findbug, based on the software assurance reference dataset (SARD). The finding shows that the tools were effective and could effectively be applied for bug detection.…”
Section: Related Workmentioning
confidence: 99%
“…The results of the study shows that existing vulnerability detection tools for Android apps are very limited in their ability to detect known vulnerabilities. Ashouri 28 evaluated the bug detection capabilities of three static analysis tools, namely, YASCA, CAT.NET, and Findbug, based on the software assurance reference dataset (SARD). The finding shows that the tools were effective and could effectively be applied for bug detection.…”
Section: Related Workmentioning
confidence: 99%