Mobile applications can access both sensitive personal data and the network, giving rise to threats of data leaks. App auditing is a fundamental program analysis task to reveal such leaks. Currently, static analysis is the de facto technique which exhaustively examines all data flows and pinpoints problematic ones. However, static analysis generates false alarms for being over-estimated and requires minutes or even hours to examine a real app. These shortcomings greatly limit the usability of automatic app auditing. To overcome these limitations, we design AppAudit that relies on the synergy of static and dynamic analysis to provide effective real-time app auditing. AppAudit embodies a novel dynamic analysis that can simulate the execution ...
Similar to the PC world, the abundance of mobile malware has become a serious threat to smartphone u...
Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-...
With the increasing complexity of application software there is an acute need for software analysis ...
The increasing number of repeated malware penetrations into official mobile app markets poses a high...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
Static explicit information flow analysis can help human au-ditors find malware. We propose a proces...
Mobile applications (also called apps) have greatly extended and innovated users' daily tasks. The m...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Today’s smart-phones are ubiquitous in people’s lives, collecting and storing private and confident...
Abstract—Android dominates the smartphone operating sys-tem market and consequently has attracted th...
Due to the rapid increase of Android apps and their wide usage to handle personal data, a precise an...
In the last decade, smartphones have gained widespread usage. Since the advent of online application...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
Similar to the PC world, the abundance of mobile malware has become a serious threat to smartphone u...
Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-...
With the increasing complexity of application software there is an acute need for software analysis ...
The increasing number of repeated malware penetrations into official mobile app markets poses a high...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
An enormous number of apps have been developed for Android in recent years, making it one of the mos...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
Static explicit information flow analysis can help human au-ditors find malware. We propose a proces...
Mobile applications (also called apps) have greatly extended and innovated users' daily tasks. The m...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Today’s smart-phones are ubiquitous in people’s lives, collecting and storing private and confident...
Abstract—Android dominates the smartphone operating sys-tem market and consequently has attracted th...
Due to the rapid increase of Android apps and their wide usage to handle personal data, a precise an...
In the last decade, smartphones have gained widespread usage. Since the advent of online application...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
Similar to the PC world, the abundance of mobile malware has become a serious threat to smartphone u...
Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-...
With the increasing complexity of application software there is an acute need for software analysis ...