Exfiltrating sensitive information from smartphones has become one of the most significant security threats. We have built a system to identify HTTP-based information exfiltration of malicious Android applications. In this paper, we discuss the method to track the propagation of sensitive information in Android applications using static taint analysis. We have studied the leaked information, destinations to which information is exfiltrated, and their correlations with types of sensitive information. The analysis results based on 578 malicious Android applications have revealed that a significant portion of these applications are interested in identity-related sensitive information. The vast majority of malicious applications leak multiple t...
Due to its popularity and open-source nature, Android is the mobile platform that has been targeted ...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensiti...
Exfiltrating sensitive information from smartphones has become one of the most significant security ...
According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted a...
Android has dominated the mobile market for a few years now, and continues to increase its market sh...
Insecure applications (apps) are increasingly used to steal users’ location information for illegal ...
The openness of Android application development mech-anism poses security challenges to smartphone u...
Android is a popular mobile-device platform developed by Google. Android’s application model is desi...
Part 4: Operating System and Firmware SecurityInternational audienceMalicious third-party applicatio...
While smartphones and mobile apps have been an integral part of our life, personal security issues o...
Nowadays, developing Android applications is becoming easier and simpler. More and more new applicat...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
We report on a new threat campaign, underway in Korea, which infected around 20,000 Android users wi...
Due to its popularity and open-source nature, Android is the mobile platform that has been targeted ...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensiti...
Exfiltrating sensitive information from smartphones has become one of the most significant security ...
According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted a...
Android has dominated the mobile market for a few years now, and continues to increase its market sh...
Insecure applications (apps) are increasingly used to steal users’ location information for illegal ...
The openness of Android application development mech-anism poses security challenges to smartphone u...
Android is a popular mobile-device platform developed by Google. Android’s application model is desi...
Part 4: Operating System and Firmware SecurityInternational audienceMalicious third-party applicatio...
While smartphones and mobile apps have been an integral part of our life, personal security issues o...
Nowadays, developing Android applications is becoming easier and simpler. More and more new applicat...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
We report on a new threat campaign, underway in Korea, which infected around 20,000 Android users wi...
Due to its popularity and open-source nature, Android is the mobile platform that has been targeted ...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensiti...