One approach to defending against malicious Android applications has been to analyze them to detect potential information leaks. This paper describes a new static taint analysis for Android that com-bines and augments the FlowDroid and Epicc analyses to precisely track both inter-component and intra-component data flow in a set of Android applications. The analysis takes place in two phases: given a set of applications, we first determine the data flows en-abled individually by each application, and the conditions under which these are possible; we then build on these results to enu-merate the potentially dangerous data flows enabled by the set of applications as a whole. This paper describes our analysis method, implementation, and experim...
Smartphones carry a large quantity of sensitive information to satisfy people’s various requirements...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceSecurity in embedded systems such as smartphones requires protection of confid...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Numerous static taint analysis techniques have recently been proposed for identifying information fl...
International audienceThe native app development is increased in Android systems to implement CPU-in...
Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensiti...
Abstract. The number of Android apps have grown explosively in re-cent years and the number of apps ...
Today’s smart phones are a ubiquitous source of private and confidential data. At the same time, sma...
Most of the prior works [1], [2], [3], [4] on applying static analysis to address security problems ...
Android has been steadily gaining popularity ever since its launch in 2008. One of the major factors...
Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-...
We propose a new approach to conduct static analysis for security vetting of Android apps, and built...
Smartphones carry a large quantity of sensitive information to satisfy people’s various requirements...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceSecurity in embedded systems such as smartphones requires protection of confid...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Numerous static taint analysis techniques have recently been proposed for identifying information fl...
International audienceThe native app development is increased in Android systems to implement CPU-in...
Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensiti...
Abstract. The number of Android apps have grown explosively in re-cent years and the number of apps ...
Today’s smart phones are a ubiquitous source of private and confidential data. At the same time, sma...
Most of the prior works [1], [2], [3], [4] on applying static analysis to address security problems ...
Android has been steadily gaining popularity ever since its launch in 2008. One of the major factors...
Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-...
We propose a new approach to conduct static analysis for security vetting of Android apps, and built...
Smartphones carry a large quantity of sensitive information to satisfy people’s various requirements...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceSecurity in embedded systems such as smartphones requires protection of confid...