Abstract—Over the last three years, Android has established itself as the largest-selling operating system for smartphones. It boasts of a Linux-based robust kernel, a modular framework with multiple components in each application, and a security-conscious design where each application is isolated in its own virtual machine. However, all of these desirable properties would be rendered ineffectual if an application were to deliver erroneous messages to targeted applications and thus cause the target to behave incorrectly. In this paper, we present an empir-ical evaluation of the robustness of Inter-component Commu-nication (ICC) in Android through fuzz testing methodology, whereby, parameters of the inter-component communication are changed ...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
As we move toward increasingly larger scales of computing, complexity of systems and networks has in...
Testing is a crucial stage in the software development process that is used to uncover bugs and pote...
Abstract—In the Android operating system, each application consists of a set of components that comm...
Android is widely used for the development and deployment of autonomous and smart systems, including...
Many threats present in smartphones are the result of in-teractions between application components, ...
The Android platform is designed to facilitate inter-app integration and communication, so that apps...
Many threats present in smartphones are the result of in-teractions between application components, ...
Security threats using intent based inter component communication (ICC) channels in Android are unde...
A central aspect of the Android platform is Inter-Component Communication (ICC), which allows the re...
An increasing number of attacks by mobile malware have begun to target critical infrastructure asset...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
The security of Android has been recently challenged by the discovery of a number of vulnerabilities...
The success of the Android OS in its user base as well as in its developer base can partly be attrib...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
As we move toward increasingly larger scales of computing, complexity of systems and networks has in...
Testing is a crucial stage in the software development process that is used to uncover bugs and pote...
Abstract—In the Android operating system, each application consists of a set of components that comm...
Android is widely used for the development and deployment of autonomous and smart systems, including...
Many threats present in smartphones are the result of in-teractions between application components, ...
The Android platform is designed to facilitate inter-app integration and communication, so that apps...
Many threats present in smartphones are the result of in-teractions between application components, ...
Security threats using intent based inter component communication (ICC) channels in Android are unde...
A central aspect of the Android platform is Inter-Component Communication (ICC), which allows the re...
An increasing number of attacks by mobile malware have begun to target critical infrastructure asset...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
The security of Android has been recently challenged by the discovery of a number of vulnerabilities...
The success of the Android OS in its user base as well as in its developer base can partly be attrib...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
As we move toward increasingly larger scales of computing, complexity of systems and networks has in...