Vulnerability Reachability
Is your program exploitable via a known vulnerability? If so, what is the complexity, and if not, what are the mitigating factors?
PIs:
Michael Gordon,
Jeff Perkins,
Ricardo Baratto
Projects:
DroidSafe,
DRIFT,
Aria,
Sansa
Solutions:
DIODE,
CodeHawk