Part 4: Operating System and Firmware SecurityInternational audienceMalicious third-party applications can leak personal data stored in the Android system by exploiting side channels. TaintDroid uses a dynamic taint analysis mechanism to control the manipulation of private data by third-party apps [9]. However, TaintDroid does not propagate taint in side channels. An attacker can exploit this limitation to get private data. For example, Sarwar et al. [2] present side channel class of attacks using a medium that might be overlooked by the taint-checking mechanism to extract sensitive data in Android system. In this paper, we enhance the TaintDroid system and we propagate taint in side channels using formal policy rules. To evaluate the effec...
Cryptography has been extensively used in Android applications to guarantee secure communications, c...
Modern smartphone platforms implement permission-based models to protect access to sensitive data an...
Today’s smartphone operating systems frequently fail to provide users with visibility into how third...
Part 4: Operating System and Firmware SecurityInternational audienceMalicious third-party applicatio...
Nowadays, developing Android applications is becoming easier and simpler. More and more new applicat...
According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted a...
We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensiti...
Security in embedded systems such as smartphones requires protection of private data manipulated by ...
© 2018 Private breach has always been an important threat to mobile security. Recent studies show th...
© 2018 IEEE. Private breach has always been an important threat to mobile security. Recent studies s...
Abstract—In Android systems, an attacker can obfuscate an application code to leak sensitive informa...
Exfiltrating sensitive information from smartphones has become one of the most significant security ...
Increasingly, malicious Android apps use various methods to steal private user data without their kn...
International audienceToday, security is a requirement for smartphone operating systems that are use...
Cryptography has been extensively used in Android applications to guarantee secure communications, c...
Modern smartphone platforms implement permission-based models to protect access to sensitive data an...
Today’s smartphone operating systems frequently fail to provide users with visibility into how third...
Part 4: Operating System and Firmware SecurityInternational audienceMalicious third-party applicatio...
Nowadays, developing Android applications is becoming easier and simpler. More and more new applicat...
According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted a...
We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensiti...
Security in embedded systems such as smartphones requires protection of private data manipulated by ...
© 2018 Private breach has always been an important threat to mobile security. Recent studies show th...
© 2018 IEEE. Private breach has always been an important threat to mobile security. Recent studies s...
Abstract—In Android systems, an attacker can obfuscate an application code to leak sensitive informa...
Exfiltrating sensitive information from smartphones has become one of the most significant security ...
Increasingly, malicious Android apps use various methods to steal private user data without their kn...
International audienceToday, security is a requirement for smartphone operating systems that are use...
Cryptography has been extensively used in Android applications to guarantee secure communications, c...
Modern smartphone platforms implement permission-based models to protect access to sensitive data an...
Today’s smartphone operating systems frequently fail to provide users with visibility into how third...