The Vulnerability Analysis Of Java Bytecode Based On Points-To Dataflow

Tang Hong, Zhang Lufeng, Chen Hua, Zhang Jianbo
2009 Zenodo  
Today many developers use the Java components collected from the Internet as external LIBs to design and develop their own software. However, some unknown security bugs may exist in these components, such as SQL injection bug may comes from the components which have no specific check for the input string by users. To check these bugs out is very difficult without source code. So a novel method to check the bugs in Java bytecode based on points-to dataflow analysis is in need, which is different
more » ... to the common analysis techniques base on the vulnerability pattern check. It can be used as an assistant tool for security analysis of Java bytecode from unknown softwares which will be used as extern LIBs.
doi:10.5281/zenodo.1082355 fatcat:flwiigcfqvhqzg5smpvnwlho5q