The present paper proposes the first static analysis for Android applications which is both flow-sensitive on the heap abstraction and provably sound with respect to a rich formal model of the Android platform. We formulate the analysis as a set of Horn clauses defining a sound over-approximation of the semantics of the Android application to analyse, borrowing ideas from recency abstraction and extending them to our concurrent setting. Moreover, we implement the analysis in HornDroid, a state-of-the-art information flow analyser for Android applications. Our extension allows HornDroid to perform strong updates on heap-allocated data structures, thus significantly increasing its precision, without sacrificing its soundness guarantees. We te...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
When performing program analysis, loops are one of the most important aspects that needs to be taken...
Numerous static taint analysis techniques have recently been proposed for identifying information fl...
The present paper proposes the first static analysis for Android applications which is both flow-sen...
We present HornDroid, a new tool for the static analysis of information flow properties in Android a...
We present HornDroid, a new tool for the static analysis of information flow properties in Android a...
The assessment of information flows is an essential part of analyzing Android apps, and is frequentl...
Heapster and DroidMacroBench artifacts for the ICSE 2020 paper "Heaps'n Leaks: How Heap Snapshots Im...
Android is a programming language based on Java and an operating system for embedded and mobile devi...
Context: Android is a programming language based on Java and an operating system for embedded and mo...
Software applications developed for the Android platform are very popular. Due to this, static analy...
One approach to defending against malicious Android applications has been to analyze them to detect ...
The popularity of Android software has grown dramatically in the last few years. It is essential for...
Context: Static analysis exploits techniques that parse program source code or bytecode, often trave...
Mobile and portable devices are machines that users carry with them everywhere, they can be seen as ...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
When performing program analysis, loops are one of the most important aspects that needs to be taken...
Numerous static taint analysis techniques have recently been proposed for identifying information fl...
The present paper proposes the first static analysis for Android applications which is both flow-sen...
We present HornDroid, a new tool for the static analysis of information flow properties in Android a...
We present HornDroid, a new tool for the static analysis of information flow properties in Android a...
The assessment of information flows is an essential part of analyzing Android apps, and is frequentl...
Heapster and DroidMacroBench artifacts for the ICSE 2020 paper "Heaps'n Leaks: How Heap Snapshots Im...
Android is a programming language based on Java and an operating system for embedded and mobile devi...
Context: Android is a programming language based on Java and an operating system for embedded and mo...
Software applications developed for the Android platform are very popular. Due to this, static analy...
One approach to defending against malicious Android applications has been to analyze them to detect ...
The popularity of Android software has grown dramatically in the last few years. It is essential for...
Context: Static analysis exploits techniques that parse program source code or bytecode, often trave...
Mobile and portable devices are machines that users carry with them everywhere, they can be seen as ...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
When performing program analysis, loops are one of the most important aspects that needs to be taken...
Numerous static taint analysis techniques have recently been proposed for identifying information fl...