[Soot-list] Hacking a Jimple interpreter at ISSTA

Manuel Benz manuel.benz at uni-paderborn.de
Fri Jul 13 14:49:34 EDT 2018


Hi Everyone.

For those of you that are visiting ISSTA next week, make sure to drop by the Panathon - program analysis hackathon<https://conf.researchr.org/track/ecoop-issta-2018/panathon-2018> on Thursday!

We will implement a dynamic interpreter to concretely execute programs directly in the Jimple IR. This can be useful in contexts in which certain information (e.g. the result of String operations) are hard to determine statically. Also, such a concrete dynamic interpreter could then later-on be extended to support concolic or symbolic execution.

I’ve set up a repository<https://github.com/secure-software-engineering/Jimple-Interpreter> with instruction, some skeleton code and test cases. Feel free to already have a look if you feel curious!

I am very much looking forward to see you at Panathon and have a great time hacking!

Best,
Manuel


Manuel Benz, M. Sc., M. Sc.
Heinz Nixdorf Institut
Universität Paderborn
Softwaretechnik
Fürstenallee 11
33102 Paderborn
Raum F1.119
Tel: +49 5251 606567
Fax: +49 5251 606565
Mail: manuel.benz at upb.de<mailto:manuel.benz at upb.de>
Web: https://hni.uni-paderborn.de/swt/

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.CS.McGill.CA/pipermail/soot-list/attachments/20180713/f3038557/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image002.png
Type: image/png
Size: 500 bytes
Desc: image002.png
URL: <https://mailman.CS.McGill.CA/pipermail/soot-list/attachments/20180713/f3038557/attachment.png>


More information about the Soot-list mailing list