Since Tai-e was released, many high-quality academic papers have been built on Tai-e to build their own analysis tools.
Conference/Journal | Paper |
---|---|
OOPSLA 2025
|
Two Approaches to Fast Bytecode Frontend for Static Analysis
|
PLDI 2025
|
Pointer Analysis for Database-Backed Applications
|
S&P 2025
|
Detecting Taint-Style Vulnerabilities in Microservice-Structured
Web Applications
|
USENIX Security 2025
|
Towards Automatic Detection and Exploitation of Java Web
Application Vulnerabilities via Concolic Execution guided by Cross-thread Object
Manipulation
|
ISSTA 2025
|
Bridge the Islands: Pointer Analysis for Microservice Systems
|
ICSE 2025
|
Interactive Cross-Language Pointer Analysis for Resolving Native Code in Java Programs
|
ICSE 2025
|
PacDroid: A Pointer-Analysis-Centric Framework for Security
Vulnerabilities in Android Apps
|
ICSE 2025
|
Module-Aware Context Sensitive Pointer Analysis
|
TSE 2024
|
Does the Vulnerability Threaten Our Projects? Automated Vulnerable
API Detection for Third-Party Libraries
|
TrustCom 2024
|
EffiTaint: Boosting Sensitive Data Tracking with Accurate Taint
Behavior Modeling and Efficient Access Path Optimization
|
PLDI 2023
|
Context sensitivity without contexts: A cut-shortcut approach to
fast and precise pointer analysis
|
Heliyon 2023
|
CRSExtractor: Automated configuration option read sites extraction
towards IoT cloud infrastructure
|
ISSTA 2023
ORIGIN
|
Tai-e: A Developer-Friendly Static Analysis Framework for Java by Harnessing the Good Designs of Classics
|