Cited By
View all- Pathade KKhedker U(2023)Computing maximum fixed point solutions over feasible paths in data flow analysesScience of Computer Programming10.1016/j.scico.2023.102944228(102944)Online publication date: Jun-2023
- Fang YWang CSun ZCheng H(2021)Jyane: Detecting Reentrancy vulnerabilities based on path profiling method2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)10.1109/ICPADS53394.2021.00040(274-282)Online publication date: Dec-2021
- Zhang JTian CDuan Z(2021)An efficient approach for taint analysis of android applicationsComputers & Security10.1016/j.cose.2020.102161104(102161)Online publication date: May-2021
- Show More Cited By