We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensitive information flow type system, and DroidInfer, the corresponding type in-ference analysis for detecting privacy leaks in Android apps. We present novel techniques for error reporting based on CFL-reachability, as well as novel techniques for handling of Android-specific features, including libraries, multiple entry points and callbacks, and inter-component communication. Empirical results show that our approach is scalable and precise. DroidInfer scales well in terms of time and memory and has false-positive rate of 15.7%. It detects privacy leaks in apps from the Google Play Store and in known malware. 1
Studies show that malicious applications can obtain sensitive data from and perform protected operat...
The Android application ecosystem has thrived, with hundreds of thousands of applications (apps) ava...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-...
Nowadays, developing Android applications is becoming easier and simpler. More and more new applicat...
Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Today’s smart phones are a ubiquitous source of private and confidential data. At the same time, sma...
Abstract. The number of Android apps have grown explosively in re-cent years and the number of apps ...
Integrity types can help detect information flow vulnerabilities in web applications and Android app...
One approach to defending against malicious Android applications has been to analyze them to detect ...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted a...
Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Play. ...
Part 4: Operating System and Firmware SecurityInternational audienceMalicious third-party applicatio...
Studies show that malicious applications can obtain sensitive data from and perform protected operat...
The Android application ecosystem has thrived, with hundreds of thousands of applications (apps) ava...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-...
Nowadays, developing Android applications is becoming easier and simpler. More and more new applicat...
Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Today’s smart phones are a ubiquitous source of private and confidential data. At the same time, sma...
Abstract. The number of Android apps have grown explosively in re-cent years and the number of apps ...
Integrity types can help detect information flow vulnerabilities in web applications and Android app...
One approach to defending against malicious Android applications has been to analyze them to detect ...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted a...
Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Play. ...
Part 4: Operating System and Firmware SecurityInternational audienceMalicious third-party applicatio...
Studies show that malicious applications can obtain sensitive data from and perform protected operat...
The Android application ecosystem has thrived, with hundreds of thousands of applications (apps) ava...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...