Cited By
View all- Das DBose PMachiry AMariani SShoshitaishvili YVigna GKruegel C(2022)Hybrid Pruning: Towards Precise Pointer and Taint AnalysisDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-031-09484-2_1(1-22)Online publication date: 24-Jun-2022
- Wang JWu YZhou GYu YGuo ZXiong YDevanbu PCohen MZimmermann T(2020)Scaling static taint analysis to industrial SOA applications: a case study at AlibabaProceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3368089.3417059(1477-1486)Online publication date: 8-Nov-2020
- Wu ZChen XYang ZDu X(2019)Reducing Security Risks of Suspicious Data and Codes Through a Novel Dynamic Defense ModelIEEE Transactions on Information Forensics and Security10.1109/TIFS.2019.290179814:9(2427-2440)Online publication date: Sep-2019
- Show More Cited By