Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-component data-flow analysis to detect privacy leaks between components of Android applications. Unlike all current approaches, our tool, called IccTA, propagates the context between the components, which improves the precision of the analysis. IccTA outperforms all other available tools by reaching a precision of 95.0% and a recall of 82.6% on DroidBench. Our approach detects 147 inter-component based privacy leaks in 14 applications in a set of 3000 real-world applications with a precision of 88.4%. With the help of ApkCombiner, our approach is able to detect inter-app based privacy leaks
To overcome the resource and computing power limitation of mobile devices in Internet of Things (IoT...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted a...
Android applications may leak privacy data carelessly or maliciously. In this work we perform inter...
Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Play. ...
peer reviewedShake Them All is a popular "Wallpaper" application exceeding millions of downloads on ...
Abstract. The number of Android apps have grown explosively in re-cent years and the number of apps ...
Abstract—Smartphone applications can steal users ’ private data and send it out behind their back. T...
We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensiti...
The Android application ecosystem has thrived, with hundreds of thousands of applications (apps) ava...
The objective of this report is to give the reader an overview of what the author has researched and...
We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform ...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
In the last decade, smartphones have gained widespread usage. Since the advent of online application...
While smartphones and mobile apps have been an integral part of our life, personal security issues o...
To overcome the resource and computing power limitation of mobile devices in Internet of Things (IoT...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted a...
Android applications may leak privacy data carelessly or maliciously. In this work we perform inter...
Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Play. ...
peer reviewedShake Them All is a popular "Wallpaper" application exceeding millions of downloads on ...
Abstract. The number of Android apps have grown explosively in re-cent years and the number of apps ...
Abstract—Smartphone applications can steal users ’ private data and send it out behind their back. T...
We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensiti...
The Android application ecosystem has thrived, with hundreds of thousands of applications (apps) ava...
The objective of this report is to give the reader an overview of what the author has researched and...
We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform ...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
In the last decade, smartphones have gained widespread usage. Since the advent of online application...
While smartphones and mobile apps have been an integral part of our life, personal security issues o...
To overcome the resource and computing power limitation of mobile devices in Internet of Things (IoT...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted a...