Despite much effort in the community, the momentum of Android research has not yet produced complete tools to perform thorough analysis on Android apps, leaving users vulnerable to malicious apps. Because it is hard for a single tool to efficiently address all of the various challenges of Android programming which make analysis difficult, we propose to instrument the app code for reducing the analysis complexity, e.g., transforming a hard problem to a easy-resolvable one. To this end, we introduce in this paper Apkpler, a plugin-based framework for supporting such instrumentation. We evaluate Apkpler with two plugins, demonstrating the feasibility of our approach and showing that Apkpler can indeed be leveraged to reduce the analysis comple...
(BADGERS). Abstract—The smartphone industry has been one of the fastest growing technological areas ...
Today’s feature-rich smartphone apps intensively rely on access to highly sensitive (personal) data....
Android developers heavily use reflection in their apps for legitimate reasons, but also significant...
peer reviewedDespite much effort in the community, the momentum of Android research has not yet prod...
In general, software is unreliable. Its behavior can deviate from users’ expectations because of bug...
Application vetting at app stores and market places is the first line of defense to protect mobile e...
Within a few years, Android has been established as a leading platform in the mobile market with ove...
Static analysis has been applied to dissect Android apps for many years. The main advantage of using...
Due to the quality and security requirements that come with an always-on mobile device processing la...
Security vetting of Android apps is often performed under tight time constraints (e.g., a few minute...
Application vetting at app stores and market places is the first line of defense to protect mobile e...
Android is an extensively used mobile platform and with evolution it has also witnessed an increased...
Abstract. Android apps are made of components which can leak infor-mation between one another using ...
Users can today download a wide variety of apps ranging from simple toy games to sophisticated busin...
The recent past has shown that Android smartphones became the most popular target for malware author...
(BADGERS). Abstract—The smartphone industry has been one of the fastest growing technological areas ...
Today’s feature-rich smartphone apps intensively rely on access to highly sensitive (personal) data....
Android developers heavily use reflection in their apps for legitimate reasons, but also significant...
peer reviewedDespite much effort in the community, the momentum of Android research has not yet prod...
In general, software is unreliable. Its behavior can deviate from users’ expectations because of bug...
Application vetting at app stores and market places is the first line of defense to protect mobile e...
Within a few years, Android has been established as a leading platform in the mobile market with ove...
Static analysis has been applied to dissect Android apps for many years. The main advantage of using...
Due to the quality and security requirements that come with an always-on mobile device processing la...
Security vetting of Android apps is often performed under tight time constraints (e.g., a few minute...
Application vetting at app stores and market places is the first line of defense to protect mobile e...
Android is an extensively used mobile platform and with evolution it has also witnessed an increased...
Abstract. Android apps are made of components which can leak infor-mation between one another using ...
Users can today download a wide variety of apps ranging from simple toy games to sophisticated busin...
The recent past has shown that Android smartphones became the most popular target for malware author...
(BADGERS). Abstract—The smartphone industry has been one of the fastest growing technological areas ...
Today’s feature-rich smartphone apps intensively rely on access to highly sensitive (personal) data....
Android developers heavily use reflection in their apps for legitimate reasons, but also significant...