{"id":4123,"date":"2016-08-26T11:56:49","date_gmt":"2016-08-26T09:56:49","guid":{"rendered":"https:\/\/blogs.uni-paderborn.de\/sse\/?page_id=4123"},"modified":"2017-07-02T21:45:51","modified_gmt":"2017-07-02T19:45:51","slug":"cheetah-just-in-time-analysis","status":"publish","type":"page","link":"https:\/\/blogs.uni-paderborn.de\/sse\/tools\/cheetah-just-in-time-analysis\/","title":{"rendered":"Cheetah &#8211; Just-in-time analysis"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_4123 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_4123')){$('.twoclick_social_bookmarks_post_4123').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blogs.uni-paderborn.de\\\/sse\\\/tools\\\/cheetah-just-in-time-analysis\\\/\",\"post_id\":4123,\"post_title_referrer_track\":\"Cheetah+%26%238211%3B+Just-in-time+analysis\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p>Here you can find information and artifacts related to the following\u00a0paper:<\/p>\n<p><a href=\"http:\/\/bodden.de\/pubs\/nal+17jit.pdf\"><span class=\"bibtitle\">Just-in-Time Static Analysis<\/span><\/a> <span class=\"bibauthor\">(Lisa Nguyen Quang Do, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, Emerson Murphy-Hill)<\/span>, <span class=\"bibbooktitle\">In International Symposium on Software Testing and Analysis (ISSTA)<\/span>, 2017.<\/p>\n<p><strong>Artifacts for CHEETAH \u2013 A JIT taint analysis for Android applications<\/strong><\/p>\n<ul>\n<li>Technical report 2016: <a href=\"http:\/\/dx.doi.org\/10.7939\/DVN\/10859\">Just-in-Time Static Analysis<\/a> (Lisa Nguyen Quang Do, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, Emerson Murphy-Hill)<\/li>\n<li><a href=\"https:\/\/github.com\/secure-software-engineering\/cheetah\">Source code of CHEETAH<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=AMq9sFo7gjc\">GUI elements of CHEETAH (Video)<\/a><\/li>\n<li><a href=\"https:\/\/blogs.uni-paderborn.de\/sse\/files\/2016\/08\/JITA_UserStudy.pdf\">User study documents<\/a> (survey template, participants&#8217; responses, interview protocol)<\/li>\n<li>Technical report 2015: <a href=\"http:\/\/research.microsoft.com\/en-us\/um\/people\/livshits\/papers\/tr\/Tech_Report_TUD-CS-2015-1167.pdf\">Toward a Just-in-Time Static Analysis<\/a> <span class=\"bibauthor\">(Lisa Nguyen Quang Do, Karim Ali, Eric Bodden, Benjamin Livshits)<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here you can find information and artifacts related to the following\u00a0paper: Just-in-Time Static Analysis (Lisa Nguyen Quang Do, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, Emerson Murphy-Hill), In International Symposium on Software Testing and Analysis (ISSTA), 2017. Artifacts for &hellip; <a href=\"https:\/\/blogs.uni-paderborn.de\/sse\/tools\/cheetah-just-in-time-analysis\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":6631,"featured_media":0,"parent":22,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4123","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/pages\/4123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/users\/6631"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/comments?post=4123"}],"version-history":[{"count":5,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/pages\/4123\/revisions"}],"predecessor-version":[{"id":4303,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/pages\/4123\/revisions\/4303"}],"up":[{"embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/pages\/22"}],"wp:attachment":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/media?parent=4123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}