{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T00:49:19Z","timestamp":1775868559572,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T00:00:00Z","timestamp":1415664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,11]]},"DOI":"10.1145\/2635868.2635878","type":"proceedings-article","created":{"date-parts":[[2014,11,4]],"date-time":"2014-11-04T21:44:36Z","timestamp":1415137476000},"page":"98-108","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases"],"prefix":"10.1145","author":[{"given":"Johannes","family":"Lerch","sequence":"first","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Ben","family":"Hermann","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Eric","family":"Bodden","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany \/ Fraunhofer SIT, Germany"}]},{"given":"Mira","family":"Mezini","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259052"},{"key":"e_1_3_2_1_2_1","volume-title":"19th Annual Network and Distributed System Security Symposium","author":"Bugiel S.","year":"2012","unstructured":"S. Bugiel , L. Davi , A. Dmitrienko , T. Fischer , A.-R. Sadeghi , and B. Shastry . Towards taming privilege-escalation attacks on Android . In 19th Annual Network and Distributed System Security Symposium , 2012 . S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on Android. In 19th Annual Network and Distributed System Security Symposium, 2012."},{"key":"e_1_3_2_1_3_1","first-page":"101","volume-title":"9th European Conference, \u02da Aarhus, Denmark, August 7\u201311","author":"Dean J.","year":"1995","unstructured":"J. Dean , D. Grove , and C. Chambers . Optimization of object-oriented programs using static class hierarchy analysis. In ECOOP\u201995\u2014Object-Oriented Programming , 9th European Conference, \u02da Aarhus, Denmark, August 7\u201311 , 1995 , pages 77\u2013 101 . Springer, 1995. J. Dean, D. Grove, and C. Chambers. Optimization of object-oriented programs using static class hierarchy analysis. In ECOOP\u201995\u2014Object-Oriented Programming, 9th European Conference, \u02da Aarhus, Denmark, August 7\u201311, 1995, pages 77\u2013101. Springer, 1995."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30579-8_23"},{"key":"e_1_3_2_1_7_1","volume-title":"A new algorithm for low-deterministic security. Technical report","author":"Giffhorn D.","year":"2012","unstructured":"D. Giffhorn and G. Snelting . A new algorithm for low-deterministic security. Technical report , Karlsruhe Institute of Technology , 2012 . D. Giffhorn and G. Snelting. A new algorithm for low-deterministic security. Technical report, Karlsruhe Institute of Technology, 2012."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 19th Annual Symposium on Network and Distributed System Security","author":"Grace M.","year":"2012","unstructured":"M. Grace , Y. Zhou , Z. Wang , and X. Jiang . Systematic detection of capability leaks in stock android smartphones . In Proceedings of the 19th Annual Symposium on Network and Distributed System Security , 2012 . M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic detection of capability leaks in stock android smartphones. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security, 2012."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 6th Working Conference on Programming Languages","author":"Graf J.","year":"2013","unstructured":"J. Graf , M. Hecker , and M. Mohr . Using JOANA for Information Flow Control in Java Programs - A Practical Guide . In Proceedings of the 6th Working Conference on Programming Languages , 2013 . J. Graf, M. Hecker, and M. Mohr. Using JOANA for Information Flow Control in Java Programs - A Practical Guide. In Proceedings of the 6th Working Conference on Programming Languages, 2013."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0086-1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480706"},{"key":"e_1_3_2_1_13_1","unstructured":"Julia. http:\/\/www.juliasoft.com\/products retrieved 2014-03-16.  Julia. http:\/\/www.juliasoft.com\/products retrieved 2014-03-16."},{"key":"e_1_3_2_1_14_1","volume-title":"Cetus Users and Compiler Infrastructure Workshop","author":"Lam P.","year":"2011","unstructured":"P. Lam , E. Bodden , O. Lhot\u00e1k , and L. Hendren . The Soot framework for Java program analysis: a retrospective . In Cetus Users and Compiler Infrastructure Workshop , 2011 . P. Lam, E. Bodden, O. Lhot\u00e1k, and L. Hendren. The Soot framework for Java program analysis: a retrospective. In Cetus Users and Compiler Infrastructure Workshop, 2011."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_16_1","volume-title":"ETH Zurich","author":"Marforio C.","year":"2011","unstructured":"C. Marforio , A. Francillon , S. Capkun , S. Capkun , and S. Capkun . Application collusion attack on the permission-based security model and its implications for modern smartphone systems. Department of Computer Science , ETH Zurich , 2011 . C. Marforio, A. Francillon, S. Capkun, S. Capkun, and S. Capkun. Application collusion attack on the permission-based security model and its implications for modern smartphone systems. Department of Computer Science, ETH Zurich, 2011."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11970-5_8"},{"key":"e_1_3_2_1_18_1","volume-title":"USENIX Security Symposium 2013","author":"Octeau D.","year":"2013","unstructured":"D. Octeau , P. McDaniel , S. Jha , A. Bartel , E. Bodden , J. Klein , and Y. L. Traon . Effective inter-component communication mapping in android: An essential step towards holistic security analysis . In USENIX Security Symposium 2013 , 2013 . D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. L. Traon. Effective inter-component communication mapping in android: An essential step towards holistic security analysis. In USENIX Security Symposium 2013, 2013."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199462"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048145"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37057-1_15"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542486"},{"key":"e_1_3_2_1_23_1","unstructured":"T. J.Watson Libraries for Analysis (WALA). http:\/\/wala.sf.net\/ retrieved 2014-03-16.  T. J.Watson Libraries for Analysis (WALA). http:\/\/wala.sf.net\/ retrieved 2014-03-16."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 20th Annual Symposium on Network and Distributed System Security","author":"Zhou Y.","year":"2013","unstructured":"Y. Zhou and X. Jiang . Detecting passive content leaks and pollution in android applications . In Proceedings of the 20th Annual Symposium on Network and Distributed System Security , 2013 . Introduction Overview IFDS Algorithm The Proposal in a Nutshell Analysis Design IFDS Extension to Store Path Information Unbalanced Return Flows Creating and Matching Semi-Paths Simplifications to Improve Scalability Dependent Analyses Evaluation Setup Results Related Work Confused-Deputy and Collusion Attacks Taint Analysis Information-Flow Analysis Conclusion Acknowldgements References Y. Zhou and X. Jiang. Detecting passive content leaks and pollution in android applications. In Proceedings of the 20th Annual Symposium on Network and Distributed System Security, 2013. Introduction Overview IFDS Algorithm The Proposal in a Nutshell Analysis Design IFDS Extension to Store Path Information Unbalanced Return Flows Creating and Matching Semi-Paths Simplifications to Improve Scalability Dependent Analyses Evaluation Setup Results Related Work Confused-Deputy and Collusion Attacks Taint Analysis Information-Flow Analysis Conclusion Acknowldgements References"}],"event":{"name":"SIGSOFT\/FSE'14: 22nd ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Hong Kong China","acronym":"SIGSOFT\/FSE'14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2635868.2635878","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2635868.2635878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:44Z","timestamp":1750273424000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2635868.2635878"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,11]]},"references-count":23,"alternative-id":["10.1145\/2635868.2635878","10.1145\/2635868"],"URL":"https:\/\/doi.org\/10.1145\/2635868.2635878","relation":{},"subject":[],"published":{"date-parts":[[2014,11,11]]},"assertion":[{"value":"2014-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}