Hu, X., Cheng, Y., Duan, Y., Henderson, A., and Yin, H.
(2018). Jsforce: A forced execution engine for ma-
licious javascript detection. In Lin, X., Ghorbani,
A., Ren, K., Zhu, S., and Zhang, A., editors, Se-
cureComm, pages 704–720.
Israel, G. D. (1992). Determining sample size, volume 25.
University of Florida Cooperative Extension Service,
Institute of Food and Agriculture Sciences, EDIS.
JSCover (2023). Jscover. https://github.com/tntim96/ JS-
Cover.
Kapravelos, A., Grier, C., Chachra, N., Kruegel, C., Vigna,
G., and Paxson, V. (2014). Hulk: Eliciting malicious
behavior in browser extensions. In USENIX, pages
641–654.
Kim, K., Kim, I. L., Kim, C. H., Kwon, Y., Zheng, Y.,
Zhang, X., and Xu, D. (2017). J-force: Forced execu-
tion on javascript. In The Web Conf, pages 897–906.
Kundel, D. (2020). Abstract syntax tree.
https://www.twilio.com/blog/abstract-syntax-trees.
Landi, W. (1992). Undecidability of static analysis. ACM
Letters on Programming Languages and Systems,
1(4):323–337.
Li, L., Bissyandé, T. F., Papadakis, M., Rasthofer, S., Bartel,
A., Octeau, D., Klein, J., and Traon, L. (2017). Sta-
tic analysis of android apps: A systematic literature
review. Information and Software Technology, 88:67–
95.
Marick, B., Smith, J., and Jones, M. (1999). How to misuse
code coverage. In ICTCS.
Melicher, W., Das, A., Sharif, M., Bauer, L., and Jia, L.
(2018). Riding out DOMsday: Towards detecting and
preventing DOM Cross-Site Scripting. In NDSS.
Oberlo (2023). Browsers stats in 2023.
https://www.oberlo.com/statistics/browser-market-
share.
Ou, H., Fang, Y., Guo, Y., Guo, W., and Huang, C. (2022).
Viopolicy-Detector: An Automated Approach to De-
tecting GDPR Suspected Compliance Violations in
Websites. In RAID, page 409–430.
Pan, J. and Mao, X. (2017). Detecting dom-sourced cross-
site scripting in browser extensions. In ICSME, pages
24–34. IEEE.
Pilgun, A., Gadyatskaya, O., Dashevskyi, S., Zhau-
niarovich, Y., and Kushniarou, A. (2018). An effec-
tive android code coverage tool. In CCS, pages 2189–
2191.
Qian, C., Koo, H., Oh, C., Kim, T., and Lee, W. (2020).
SLIMIUM: debloating the chromium browser with
feature subsetting. In CCS, pages 461–476.
Rapps, S. and Weyuker, E. J. (1985). Selecting software test
data using data flow information. IEEE transactions
on software engineering, SE-11(4):367–375.
Sjosten, A., Van Acker, S., Picazo-Sanchez, P., and
Sabelfeld, A. (2019). Latex gloves: Protecting
browser extensions from probing and revelation at-
tacks. In NDSS.
Solomos, K., Ilia, P., Nikiforakis, N., and Polakis, J. (2022).
Escaping the confines of time: Continuous browser
extension fingerprinting through ephemeral modifica-
tions. In CCS, page 2675–2688.
SonarCloud (2023). Sonarcloud. https://sonarcloud.io.
Sonarqube (2023). Automatically analyze branches and
decorate pull requests. https://www.sonarqube.org.
Spectral (2023). Spectral’s sast scanner.
https://spectralops.io.
Starov, O. and Nikiforakis, N. (2017). Extended track-
ing powers: Measuring the privacy diffusion en-
abled by browser extensions. In The WebConf, page
1481–1490.
Sun, F., Xu, L., and Su, Z. (2011). Static detection of ac-
cess control vulnerabilities in web applications. In
USENIX, volume 64.
Wagner, J. (2018). Trustworthy chrome extensions, by de-
fault. https://blog.chromium.org/2018/10/
trustworthy-chrome-extensions-by-default.html.
Wang, Y., Cai, W., Lyu, P., and Shao, W. (2018). A com-
bined static and dynamic analysis approach to detect
malicious browser extensions. Security and Commu-
nication Networks, 2018.
Yerima, S. Y., Alzaylaee, M. K., and Sezer, S. (2019).
Machine learning-based dynamic analysis of android
apps with improved code coverage. EURASIP Journal
on Information Security, 2019(1):1–24.
Yu, D., Chander, A., Islam, N., and Serikov, I. (2007).
Javascript instrumentation for browser security. ACM
SIGPLAN Notices, 42(1):237–249.
Zhao, B. and Liu, P. (2013). Behavior decomposi-
tion: Aspect-level browser extension clustering and
its security implications. In RAID, pages 244–264.
Springer.
Zhu, H., Hall, P. A. V., and May, J. H. R. (1997). Software
unit test coverage and adequacy. ACM Comput. Surv.,
29(4):366–427.
ICSOFT 2023 - 18th International Conference on Software Technologies
150