An enormous number of apps have been developed for Android in recent years, making it one of the most popular mobile operat-ing systems. However, the quality of the booming apps can be a concern [4]. Poorly engineered apps may contain security vulner-abilities that can severally undermine users ’ security and privacy. In this paper, we study a general category of vulnerabilities found in Android apps, namely the component hijacking vulnerabilities. Several types of previously reported app vulnerabilities, such as permission leakage, unauthorized data access, intent spoofing, and etc., belong to this category. We propose CHEX, a static analysis method to automatically vet Android apps for component hijacking vulnerabilities. Mod-eling these ...
Abstract—We present PCLeaks, a tool based on inter-component communication (ICC) vulnerabilities to ...
Studies show that malicious applications can obtain sensitive data from and perform protected operat...
In the last decade, smartphones have gained widespread usage. Since the advent of online application...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
The Android platform is designed to facilitate inter-app integration and communication, so that apps...
Smartphones play an important role in our daily lives. Once used only for communication purposes are...
The increasing number of repeated malware penetrations into official mobile app markets poses a high...
With the increasing complexity of application software there is an acute need for software analysis ...
In this paper, we systematically study two vulnerabili-ties and their presence in existing Android a...
As usage of the Android applications has grown, security concerns have also increased. Four major th...
Android platform adopts permissions to protect sensitive resources from untrusted apps. However, aft...
We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform ...
Due to their growing prevalence, smartphones can access an increasing amount of sensitive user infor...
The ubiquity of smartphones, and their very broad capabilities and usage, make the security of these...
Abstract—We present PCLeaks, a tool based on inter-component communication (ICC) vulnerabilities to ...
Studies show that malicious applications can obtain sensitive data from and perform protected operat...
In the last decade, smartphones have gained widespread usage. Since the advent of online application...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
The Android platform is designed to facilitate inter-app integration and communication, so that apps...
Smartphones play an important role in our daily lives. Once used only for communication purposes are...
The increasing number of repeated malware penetrations into official mobile app markets poses a high...
With the increasing complexity of application software there is an acute need for software analysis ...
In this paper, we systematically study two vulnerabili-ties and their presence in existing Android a...
As usage of the Android applications has grown, security concerns have also increased. Four major th...
Android platform adopts permissions to protect sensitive resources from untrusted apps. However, aft...
We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform ...
Due to their growing prevalence, smartphones can access an increasing amount of sensitive user infor...
The ubiquity of smartphones, and their very broad capabilities and usage, make the security of these...
Abstract—We present PCLeaks, a tool based on inter-component communication (ICC) vulnerabilities to ...
Studies show that malicious applications can obtain sensitive data from and perform protected operat...
In the last decade, smartphones have gained widespread usage. Since the advent of online application...