We present HornDroid, a new tool for the static analysis of information flow properties in Android applications. The core idea underlying HornDroid is to use Horn clauses for soundly abstracting the semantics of Android applications and to express security properties as a set of proof obligations that are automatically discharged by an off-the-shelf SMT solver. This approach makes it possible to fine-tune the analysis in order to achieve a high degree of precision while still using off-the-shelf verification tools, thereby leveraging the recent advances in this field. As a matter of fact, HornDroid outperforms state-of-the-art Android static analysis tools on benchmarks proposed by the community. Moreover, HornDroid is the first static anal...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Application vetting at app stores and market places is the first line of defense to protect mobile e...
Application vetting at app stores and market places is the first line of defense to protect mobile e...
We present HornDroid, a new tool for the static analysis of information flow properties in Android a...
We present HornDroid, a new tool for the static analysis of information flow properties in Android a...
Mobile and portable devices are machines that users carry with them everywhere, they can be seen as ...
The present paper proposes the first static analysis for Android applications which is both flow-sen...
The Android platform is undoubtedly the most popular platform for smartphones, with thousands of new...
Context: Static analysis exploits techniques that parse program source code or bytecode, often trave...
peer reviewedContext: Static analysis exploits techniques that parse program source code or bytecode...
Context: Android is a programming language based on Java and an operating system for embedded and mo...
Android is a programming language based on Java and an operating system for embedded and mobile devi...
Numerous static taint analysis techniques have recently been proposed for identifying information fl...
This dissertation presents a new approach to static analysis for security vetting of Android apps, a...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Application vetting at app stores and market places is the first line of defense to protect mobile e...
Application vetting at app stores and market places is the first line of defense to protect mobile e...
We present HornDroid, a new tool for the static analysis of information flow properties in Android a...
We present HornDroid, a new tool for the static analysis of information flow properties in Android a...
Mobile and portable devices are machines that users carry with them everywhere, they can be seen as ...
The present paper proposes the first static analysis for Android applications which is both flow-sen...
The Android platform is undoubtedly the most popular platform for smartphones, with thousands of new...
Context: Static analysis exploits techniques that parse program source code or bytecode, often trave...
peer reviewedContext: Static analysis exploits techniques that parse program source code or bytecode...
Context: Android is a programming language based on Java and an operating system for embedded and mo...
Android is a programming language based on Java and an operating system for embedded and mobile devi...
Numerous static taint analysis techniques have recently been proposed for identifying information fl...
This dissertation presents a new approach to static analysis for security vetting of Android apps, a...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Application vetting at app stores and market places is the first line of defense to protect mobile e...
Application vetting at app stores and market places is the first line of defense to protect mobile e...