Resource leaks -- a program does not release resources it previously acquired -- are a common kind of bug in Android applications. Even with the help of existing techniques to automatically detect leaks, writing a leak-free program remains tricky. One of the reasons is Android's event-driven programming model, which complicates the understanding of an application's overall control flow. In this paper, we present PlumbDroid: a technique to automatically detect and fix resource leaks in Android applications. PlumbDroid uses static analysis to find execution traces that may leak a resource. The information built for detection also undergirds automatically building a fix -- consisting of release operations performed at appropriate locations -...
The objective of this report is to give the reader an overview of what the author has researched and...
Android platform adopts permissions to protect sensitive resources from untrusted apps. However, aft...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
This is a replication package for our paper "Automated Repair of Resource Leaks in Android Applicati...
DroidLeaks features 292 diverse resource leak bugs in popular and large-scale open-source Android ap...
We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform ...
Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Abstract—We present PCLeaks, a tool based on inter-component communication (ICC) vulnerabilities to ...
While Apple has checked every app available on the App Store, Google takes another approach that all...
Memory leaks represent a remarkable problem for mobile app developers since a waste of memory due to...
Android apps are prone to crash. This often arises from the misuse of Android framework APIs, making...
Mobile applications have played a huge part in our daily lives, providing convenience for the appli...
Mobile applications can access both sensitive personal data and the network, giving rise to threats ...
Smartphone applications ’ quality is vital. Many smartphone ap-plications, however, suffer from vari...
The objective of this report is to give the reader an overview of what the author has researched and...
Android platform adopts permissions to protect sensitive resources from untrusted apps. However, aft...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
This is a replication package for our paper "Automated Repair of Resource Leaks in Android Applicati...
DroidLeaks features 292 diverse resource leak bugs in popular and large-scale open-source Android ap...
We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform ...
Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Abstract—We present PCLeaks, a tool based on inter-component communication (ICC) vulnerabilities to ...
While Apple has checked every app available on the App Store, Google takes another approach that all...
Memory leaks represent a remarkable problem for mobile app developers since a waste of memory due to...
Android apps are prone to crash. This often arises from the misuse of Android framework APIs, making...
Mobile applications have played a huge part in our daily lives, providing convenience for the appli...
Mobile applications can access both sensitive personal data and the network, giving rise to threats ...
Smartphone applications ’ quality is vital. Many smartphone ap-plications, however, suffer from vari...
The objective of this report is to give the reader an overview of what the author has researched and...
Android platform adopts permissions to protect sensitive resources from untrusted apps. However, aft...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...