International audienceWe propose an approach based on information flows to highlight how a ma- licious application corrupts an Android device. Basic attacks carried on by ma- licious applications often consist in leaking sensitive data to remote entities. Different works then focused on approaches to detect such attacks by analysing function calls or the access and the use of sensitive data (e.g [1,2]). However, there exist an other class of attack that threatens the integrity of the system itself or data it contains (e.g modification of the content of sensitive files or installation of new application). Such attacks tend to be overlooked and we propose here an approach to easily detect and highlight them.To highlight these attacks, we firs...
: Information flows are information exchanges between objects in a given environment. At system leve...
: Information flows are information exchanges between objects in a given environment. At system leve...
peer reviewedContext: State-of-the-art works on automated detection of Android malware have leverage...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
International audienceThe detection of new Android malware is far from being a relaxing job. Indeed,...
International audienceThe detection of new Android malware is far from being a relaxing job. Indeed,...
International audienceThe detection of new Android malware is far from being a relaxing job. Indeed,...
International audienceThe detection of new Android malware is far from being a relaxing job. Indeed,...
: Information flows are information exchanges between objects in a given environment. At system leve...
: Information flows are information exchanges between objects in a given environment. At system leve...
: Information flows are information exchanges between objects in a given environment. At system leve...
: Information flows are information exchanges between objects in a given environment. At system leve...
peer reviewedContext: State-of-the-art works on automated detection of Android malware have leverage...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
International audienceThe detection of new Android malware is far from being a relaxing job. Indeed,...
International audienceThe detection of new Android malware is far from being a relaxing job. Indeed,...
International audienceThe detection of new Android malware is far from being a relaxing job. Indeed,...
International audienceThe detection of new Android malware is far from being a relaxing job. Indeed,...
: Information flows are information exchanges between objects in a given environment. At system leve...
: Information flows are information exchanges between objects in a given environment. At system leve...
: Information flows are information exchanges between objects in a given environment. At system leve...
: Information flows are information exchanges between objects in a given environment. At system leve...
peer reviewedContext: State-of-the-art works on automated detection of Android malware have leverage...