Sound and precise malware analysis for Android via pushdown reachability and entry-point saturation S Liang, AW Keep, M Might, S Lyde, T Gilray, P Aldous, D Van Horn Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013 | 74 | 2013 |
Anadroid: Malware analysis of android with user-supplied predicates S Liang, M Might, D Van Horn Electronic Notes in Theoretical Computer Science 311, 3-14, 2015 | 22 | 2015 |
Hash-flow taint analysis of higher-order programs S Liang, M Might Proceedings of the 7th Workshop on Programming Languages and Analysis for …, 2012 | 15 | 2012 |
Fast flow analysis with godel hashes S Liang, W Sun, M Might 2014 IEEE 14th International Working Conference on Source Code Analysis and …, 2014 | 12 | 2014 |
Pruning, pushdown exception-flow analysis S Liang, W Sun, M Might, A Keep, D Van Horn 2014 IEEE 14th International Working Conference on Source Code Analysis and …, 2014 | 6 | 2014 |
LBLS: a locality bounded hashing-based location service R Rao, S Liang, J You Journal of Networks 5 (1), 19, 2010 | 2 | 2010 |
Static analysis of Android applications S Liang The University of Utah, 2014 | 1 | 2014 |
Entangled abstract domains for higher-order programs S Liang, M Might Proceedings of the 2013 Workshop on Scheme and Functional Programming …, 2013 | 1 | 2013 |
Pushdown Exception-Flow Analysis of Object-Oriented Programs S Liang, M Might, T Gilray, D Van Horn arXiv preprint arXiv:1302.2692, 2013 | | 2013 |
HTL: A Locality Bounded Flat Hash Location Service R Rao, S Liang, J You Network and Parallel Computing: IFIP International Conference, NPC 2008 …, 2008 | | 2008 |