Search
Now showing items 1-3 of 3
Validating android permission requests by analyzing APP descriptions
(2016-07)
Android applications can access sensitive user data if they are granted certain permissions. Android security model gives users the responsibility to approve permission requests of applications. For this, a user needs to ...
Extending static analysis with application-specific rules by analyzing runtime execution traces
(2016-07)
Static code analysis tools can generate alerts regarding only generic issues such as uninitialized variables. They cannot detect violations of application-speci c rules. Tools can be extended with specialized checkers that ...
Automated procedure clustering for reverse engineering PL/SQL programs
(2016-05)
Large software systems have to be decomposed into separate, modular units for providing appropriate abstractions and improving maintainability. There exist clustering techniques that are applied to provide such abstractions ...
Share this page