Automatic concurrency defect detection for Android applications
This paper describes issues related to automatic detection of concurrency defects using dynamic analysis methods with primary target subject as the Android platform. Due to the increased popularity and spread of Android platform and, more importantly, high importance of concurrent work flow for all...
| Published in: | Труды Института системного программирования РАН |
|---|---|
| Main Authors: | V. P. Ivannikov, S. P. Vartanov, M. K. Ermakov |
| Format: | Article |
| Language: | English |
| Published: |
Russian Academy of Sciences, Ivannikov Institute for System Programming
2018-10-01
|
| Subjects: | |
| Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/957 |
Similar Items
Detecting race conditions in Java programs using dynamic analysis
by: M. . Ermakov, et al.
Published: (2018-10-01)
by: M. . Ermakov, et al.
Published: (2018-10-01)
Buffer overrun detection method in binary code
by: V. V. Kaushan
Published: (2018-10-01)
by: V. V. Kaushan
Published: (2018-10-01)
Avalanche: Using dynamic analysis for automatic defect detection in programs based on network sockets
by: Ildar Isaev, et al.
Published: (2018-10-01)
by: Ildar Isaev, et al.
Published: (2018-10-01)
Applying synchronization contracts approach for dynamic detection of data races in industrial applications
by: V. Yu. Trifanov
Published: (2018-10-01)
by: V. Yu. Trifanov
Published: (2018-10-01)
Dynamic Java program analysis using virtual machine modification
by: M. . Ermakov, et al.
Published: (2018-10-01)
by: M. . Ermakov, et al.
Published: (2018-10-01)
Using unreachable code analysis in static analysis tool for finding defects in source code
by: R. R. Mulyukov, et al.
Published: (2018-10-01)
by: R. R. Mulyukov, et al.
Published: (2018-10-01)
An approach of reachability determination for static analysis defects with help of dynamic symbolic execution
by: A. Y. Gerasimov, et al.
Published: (2018-10-01)
by: A. Y. Gerasimov, et al.
Published: (2018-10-01)
Applying Java bytecode static instrumentation for software dynamic analysis
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
Applying dynamic analysis for defect detection in Java-applications
by: Sergey Vartanov, et al.
Published: (2018-10-01)
by: Sergey Vartanov, et al.
Published: (2018-10-01)
Applying dynamic analysis to programs running in interpreted environments
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
Dynamic program analysis for error detection using goal-seeking input data generation
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
Automated exploit generation method for stack buffer overflow vulnerabilities
by: V. A. Padaryan, et al.
Published: (2018-10-01)
by: V. A. Padaryan, et al.
Published: (2018-10-01)
Dynamic analysis of programs with graphical user interface based on symbolic execution
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
Avalanche: adaptation of parallel and distributed computing for dynamic analysis to improve performance of defect detection
by: M. K. Ermakov, et al.
Published: (2018-10-01)
by: M. K. Ermakov, et al.
Published: (2018-10-01)
Dynamic detection of Use After Free bugs
by: S. A. Asryan, et al.
Published: (2018-10-01)
by: S. A. Asryan, et al.
Published: (2018-10-01)
On Some Limitations of Information Flow Tracking in Full-system Emulators
by: M. A. Klimushenkova, et al.
Published: (2018-10-01)
by: M. A. Klimushenkova, et al.
Published: (2018-10-01)
Applying iterative dynamic analysis to programs with graphical user interface
by: M. K. Ermakov, et al.
Published: (2018-10-01)
by: M. K. Ermakov, et al.
Published: (2018-10-01)
Input data generation for reaching specific function in program by iterative dynamic analysis
by: A. Y. Gerasimov, et al.
Published: (2018-10-01)
by: A. Y. Gerasimov, et al.
Published: (2018-10-01)
Application of software emulators for the binary code analysis
by: P. M. Dovgalyuk, et al.
Published: (2018-10-01)
by: P. M. Dovgalyuk, et al.
Published: (2018-10-01)
Methods and software tools for combined binary code analysis
by: V. A. Padaryan, et al.
Published: (2018-10-01)
by: V. A. Padaryan, et al.
Published: (2018-10-01)
Survey on static program analysis results refinement approaches
by: A. Y. Gerasimov
Published: (2018-10-01)
by: A. Y. Gerasimov
Published: (2018-10-01)
Scalable code clone detection tool based on semantic analysis
by: Sevak Sargsyan, et al.
Published: (2018-10-01)
by: Sevak Sargsyan, et al.
Published: (2018-10-01)
Dynamic analysis of virtualization- and dispatching-obfuscated applications
by: M. G. Bakulin, et al.
Published: (2018-10-01)
by: M. G. Bakulin, et al.
Published: (2018-10-01)
Recovery of binary data structures from program traces
by: A. I. Avetisyan, et al.
Published: (2018-10-01)
by: A. I. Avetisyan, et al.
Published: (2018-10-01)
Memory violation detection method in binary code
by: V. V. Kaushan, et al.
Published: (2018-10-01)
by: V. V. Kaushan, et al.
Published: (2018-10-01)
Raising the level of abstraction of program execution trace
by: A. G. Nazarov, et al.
Published: (2018-10-01)
by: A. G. Nazarov, et al.
Published: (2018-10-01)
Using ABI for virtual machines introspection
by: N. I. Fursova, et al.
Published: (2018-10-01)
by: N. I. Fursova, et al.
Published: (2018-10-01)
Building security predicates for some types of vulnerabilities
by: A. N. Fedotov, et al.
Published: (2018-10-01)
by: A. N. Fedotov, et al.
Published: (2018-10-01)
Copy-paste semantic errors detection
by: Sevak Sargsyan
Published: (2018-10-01)
by: Sevak Sargsyan
Published: (2018-10-01)
ANALySIS OF PHASE-LOCKED SYSTEM VOLTAGE CONTROLLED OSCILLATORS
by: D. L. Shilin, et al.
Published: (2019-06-01)
by: D. L. Shilin, et al.
Published: (2019-06-01)
Modified codes with weighted-transitions summation in concurrent error detection systems of combinational circuits
by: V. V. Sapozhnikov, et al.
Published: (2018-10-01)
by: V. V. Sapozhnikov, et al.
Published: (2018-10-01)
Reading the contents of deleted and modified files in the virtualization based black-box binary analysis system Drakvuf
by: S. G. Kovalev
Published: (2018-12-01)
by: S. G. Kovalev
Published: (2018-12-01)
Statically detecting buffer overflows in C/C++
by: I. . Dudina, et al.
Published: (2018-10-01)
by: I. . Dudina, et al.
Published: (2018-10-01)
Next generation intermediate representations for binary code analysis
by: M. A. Solovev, et al.
Published: (2019-02-01)
by: M. A. Solovev, et al.
Published: (2019-02-01)
Automated Error Detection and Analysis in Hyperconverged Systems
by: Denis Vladimirovich Silakov
Published: (2019-10-01)
by: Denis Vladimirovich Silakov
Published: (2019-10-01)
Inter-procedural buffer overflows detection in C/C++ source code via static analysis
by: I. . Dudina
Published: (2018-10-01)
by: I. . Dudina
Published: (2018-10-01)
Search method for format string vulnerabilities
by: I. A. Vakhrushev, et al.
Published: (2018-10-01)
by: I. A. Vakhrushev, et al.
Published: (2018-10-01)
Format recovery
by: A. I. Getman, et al.
Published: (2018-10-01)
by: A. I. Getman, et al.
Published: (2018-10-01)
Power saving code optimization based on using the power controllable components of CPU
by: I. I. Karetin, et al.
Published: (2018-10-01)
by: I. I. Karetin, et al.
Published: (2018-10-01)
Path-sensitive bug detection analysis of C# program illustrated by null pointer dereference
by: V. . Koshelev, et al.
Published: (2018-10-01)
by: V. . Koshelev, et al.
Published: (2018-10-01)
Similar Items
-
Detecting race conditions in Java programs using dynamic analysis
by: M. . Ermakov, et al.
Published: (2018-10-01) -
Buffer overrun detection method in binary code
by: V. V. Kaushan
Published: (2018-10-01) -
Avalanche: Using dynamic analysis for automatic defect detection in programs based on network sockets
by: Ildar Isaev, et al.
Published: (2018-10-01) -
Applying synchronization contracts approach for dynamic detection of data races in industrial applications
by: V. Yu. Trifanov
Published: (2018-10-01) -
Dynamic Java program analysis using virtual machine modification
by: M. . Ermakov, et al.
Published: (2018-10-01)
