Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation 2020
DOI: 10.1145/3385412.3386026
|View full text |Cite
|
Sign up to set email alerts
|

Static analysis of Java enterprise applications: frameworks and caches, the elephants in the room

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(9 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…The OWASP WebGoat is a deliberately insecure application aiming to teach developers about relevant security vulnerabilities. As a Java Spring application 7 , it is popular in the community and has been used for evaluating static analyses (Antoniadis et al, 2020). We used this application to evaluate the applicability of fluentTQL on real-world scenario, including specifying taint-flow queries and running our Boomerang-based and FlowDroid-based taint analysis.…”
Section: Rq4 Analyzing Java/android Applicationsmentioning
confidence: 99%
“…The OWASP WebGoat is a deliberately insecure application aiming to teach developers about relevant security vulnerabilities. As a Java Spring application 7 , it is popular in the community and has been used for evaluating static analyses (Antoniadis et al, 2020). We used this application to evaluate the applicability of fluentTQL on real-world scenario, including specifying taint-flow queries and running our Boomerang-based and FlowDroid-based taint analysis.…”
Section: Rq4 Analyzing Java/android Applicationsmentioning
confidence: 99%
“…This study was from an enterprise information specialist's perspective exploring artificial intelligence functionality regarding a novel algorithm integrating into a Java-based software imaging application. The Java programming language significantly contributed to enterprise applications' success (Antoniadis et al, 2020). This study included invoking a Java imaging application as a suggestion for integrating the state-of-the-art neural network technique.…”
Section: Problem Statementmentioning
confidence: 99%
“…The main flavors of context sensitivity are call-site-sensitivity [31,32], object-sensitivity [28], and typesensitivity [33]. Of these, object-sensitivity has been shown to be remarkably precise for analyzing object-oriented programs like Java [33,34]. Object-sensitivity qualifies contexts using the object allocation site the current method was invoked on, e.g., in Fig.…”
Section: Context Sensitivitymentioning
confidence: 99%
“…Further, these techniques use off-the-shelf static analysis tools such as SOOT [22] and WALA 2 which are known to ignore crucial features used by enterprise java applications such as dependency injection [23], and centralized object store [24], among others. This often results in a sparse coverage of several critical sections of the application [25]. To overcome this challenge, certain approaches construct a dynamic call graph by instrumenting the program to amass light-weight traces as the application's many use-cases are exercised [6,26].…”
Section: Introductionmentioning
confidence: 99%