2021
DOI: 10.1007/978-3-030-71472-7_13
|View full text |Cite
|
Sign up to set email alerts
|

Static Taint Analysis for JavaScript Programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…Static taint analysis techniques rely on the possible presence of contaminated data streams in the target object, mainly for weblike applications [1] [2] and Android [3][4] applications, as both target objects are characterised by a large number of user interactions, a large number of risk points brought about by complex components and the availability of part or all of the source code. The detection of Web-based applications is mainly for their scripting languages, such as PHP [5] and JavaScript [6]; the detection of Android applications aims at protect whether sensitive information [7] such as user privacy is stolen, for example, B-Droid [8] uses static taint analysis combined with fuzzy testing to IOP Publishing doi:10.1088/1742-6596/2258/1/012069 2 detect privacy leaks by analysing the tested application's behaviour to detect privacy leaks, which can effectively detect the five most popular types of commercial spyware in the market.…”
Section: Introductionmentioning
confidence: 99%
“…Static taint analysis techniques rely on the possible presence of contaminated data streams in the target object, mainly for weblike applications [1] [2] and Android [3][4] applications, as both target objects are characterised by a large number of user interactions, a large number of risk points brought about by complex components and the availability of part or all of the source code. The detection of Web-based applications is mainly for their scripting languages, such as PHP [5] and JavaScript [6]; the detection of Android applications aims at protect whether sensitive information [7] such as user privacy is stolen, for example, B-Droid [8] uses static taint analysis combined with fuzzy testing to IOP Publishing doi:10.1088/1742-6596/2258/1/012069 2 detect privacy leaks by analysing the tested application's behaviour to detect privacy leaks, which can effectively detect the five most popular types of commercial spyware in the market.…”
Section: Introductionmentioning
confidence: 99%