{"citation":{"ieee":"M. H. F. Youkeim, Tailoring Code Property Graphs to Jimple. Paderborn: Paderborn University, 2024.","short":"M.H.F. Youkeim, Tailoring Code Property Graphs to Jimple, Paderborn University, Paderborn, 2024.","ama":"Youkeim MHF. Tailoring Code Property Graphs to Jimple. Paderborn University; 2024.","bibtex":"@book{Youkeim_2024, place={Paderborn}, title={Tailoring Code Property Graphs to Jimple}, publisher={Paderborn University}, author={Youkeim, Michael Hany Fawzy}, year={2024} }","chicago":"Youkeim, Michael Hany Fawzy. Tailoring Code Property Graphs to Jimple. Paderborn: Paderborn University, 2024.","mla":"Youkeim, Michael Hany Fawzy. Tailoring Code Property Graphs to Jimple. Paderborn University, 2024.","apa":"Youkeim, M. H. F. (2024). Tailoring Code Property Graphs to Jimple. Paderborn University."},"file_date_updated":"2024-11-27T01:16:06Z","supervisor":[{"id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric"}],"has_accepted_license":"1","oa":"1","author":[{"id":"77394","last_name":"Youkeim","full_name":"Youkeim, Michael Hany Fawzy","first_name":"Michael Hany Fawzy"}],"department":[{"_id":"76"}],"year":"2024","file":[{"relation":"main_file","file_size":432800,"access_level":"open_access","file_id":"57444","content_type":"application/pdf","file_name":"Bachelor_Thesis__Michael_Youkeim_unsigned.pdf","date_updated":"2024-11-27T01:16:06Z","date_created":"2024-11-27T01:16:06Z","creator":"myoukeim"}],"date_created":"2024-11-26T09:13:02Z","publisher":"Paderborn University","abstract":[{"text":"The increased complexity of modern software has led to much more\r\nsophisticated attack vectors. As a result, we require newer vulnerability detection\r\nmethods to ensure software security without compromising efficiency.\r\nThe Code Property Graph (CPG) is a program representation that provides a comprehensive overview of program behavior, combining abstract syntax trees, control flow\r\ngraphs, and program dependence graphs. With such a detailed data structure, we can\r\ndetect patterns that characterize known vulnerabilities and identify various security\r\nthreats. Querying the combined data structure instead of the individual graphs enables the detection of multidimensional scenarios.\r\nThis work aims to integrate the advantages of CPGs into software systems that utilize\r\nthe Jimple intermediate representation. We introduce JimNode, a novel approach for\r\ngenerating CPGs specifically tailored to Jimple. Despite the model incompatibility, our\r\nevaluation, which covered approximately 50,800 methods, reveals an 88.07% similarity\r\nof the inter-statement edges compared to Joern, the state-of-the-art tool for CPG\r\ngeneration. We provide a detailed analysis of our methodology and discuss why it is\r\nbetter suited for Jimple programs than Joern’s language-agnostic approach.","lang":"eng"}],"_id":"57416","place":"Paderborn","date_updated":"2024-11-27T01:16:38Z","ddc":["000"],"title":"Tailoring Code Property Graphs to Jimple","status":"public","language":[{"iso":"eng"}],"type":"bachelorsthesis","user_id":"77394"}