This dissertation presents a new approach to static analysis for security vetting of Android apps, and a general framework called Argus-SAF. Argus-SAF determines points-to information for all objects in an Android app component in a flow and context-sensitive (user-configurable) way and performs data-flow and data dependence analysis for the component. Argus-SAF also tracks inter-component communication activities. It can stitch the component-level information into the app- level information to perform intra-app or inter-app analysis. Moreover, Argus-SAF is NDK/JNI- aware and can efficiently track precise data-flow across language boundary. This dissertation shows that, (a) the aforementioned type of comprehensive app analysis is utterly fe...
Abstract: The Android operating system is currently dominating the mobile device market in terms of ...
One approach to defending against malicious Android applications has been to analyze them to detect ...
Context: Static analysis approaches have been proposed to assess the security of Android apps, by se...
This dissertation presents a new approach to static analysis for security vetting of Android apps, a...
We propose a new approach to conduct static analysis for security vetting of Android apps, and built...
Most of the prior works [1], [2], [3], [4] on applying static analysis to address security problems ...
The now ubiquitous Android platform lacks security features that are considered to be necessary give...
Application vetting at app stores and market places is the first line of defense to protect mobile e...
Context: Static analysis exploits techniques that parse program source code or bytecode, often trave...
Mobile and portable devices are machines that users carry with them everywhere, they can be seen as ...
Application vetting at app stores and market places is the first line of defense to protect mobile e...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Mobile devices are prevalent in everyday society and the installation of third-party applications pr...
Android is widely used for the development and deployment of autonomous and smart systems, including...
Abstract: The Android operating system is currently dominating the mobile device market in terms of ...
One approach to defending against malicious Android applications has been to analyze them to detect ...
Context: Static analysis approaches have been proposed to assess the security of Android apps, by se...
This dissertation presents a new approach to static analysis for security vetting of Android apps, a...
We propose a new approach to conduct static analysis for security vetting of Android apps, and built...
Most of the prior works [1], [2], [3], [4] on applying static analysis to address security problems ...
The now ubiquitous Android platform lacks security features that are considered to be necessary give...
Application vetting at app stores and market places is the first line of defense to protect mobile e...
Context: Static analysis exploits techniques that parse program source code or bytecode, often trave...
Mobile and portable devices are machines that users carry with them everywhere, they can be seen as ...
Application vetting at app stores and market places is the first line of defense to protect mobile e...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Mobile devices are prevalent in everyday society and the installation of third-party applications pr...
Android is widely used for the development and deployment of autonomous and smart systems, including...
Abstract: The Android operating system is currently dominating the mobile device market in terms of ...
One approach to defending against malicious Android applications has been to analyze them to detect ...
Context: Static analysis approaches have been proposed to assess the security of Android apps, by se...