Android developers heavily use reflection in their apps for legitimate reasons. However, reflection is also significantly used for hiding malicious actions. Unfortunately, current state-of-the-art static analysis tools for Android are challenged by the presence of reflective calls which they usually ignore. Thus, the results of their security analysis, e.g., for private data leaks, are incomplete, given the measures taken by malware writers to elude static detection. We propose a new instrumentation-based approach to address this issue in a non-invasive way. Specifically, we introduce to the community a prototype tool called DroidRA, which reduces the resolution of reflective calls to a composite constant propagation problem and then levera...
We present an approach and tool for general-purpose modeling of Android for static analysis. Our app...
Native code is now commonplace within Android app packages where it co-exists and interacts with Dex...
The recent past has shown that Android smartphones became the most popular target for malware author...
peer reviewedAndroid developers heavily use reflection in their apps for legitimate reasons. However...
Android developers heavily use reflection in their apps for legitimate reasons, but also significant...
peer reviewedWe demonstrate the benefits of DroidRA, a tool for taming reflection in Android apps. D...
Reflection is a programming language feature that permits analysis and transformation of the behavio...
Within a few years, Android has been established as a leading platform in the mobile market with ove...
peer reviewedStatic analysis of Android applications can be hindered by the presence of the popular ...
Reflection is a language feature which allows to analyze and transform the behavior of classes at th...
In the last decade, smartphones have gained widespread usage. Since the advent of online application...
Recently, the number of available Android apps in Googles Play Store reached 2 million. Usually, And...
Application vetting at app stores and market places is the first line of defense to protect mobile e...
It is generally challenging to tell apart malware from benign applications. To make this decision, ...
Context: Static analysis exploits techniques that parse program source code or bytecode, often trave...
We present an approach and tool for general-purpose modeling of Android for static analysis. Our app...
Native code is now commonplace within Android app packages where it co-exists and interacts with Dex...
The recent past has shown that Android smartphones became the most popular target for malware author...
peer reviewedAndroid developers heavily use reflection in their apps for legitimate reasons. However...
Android developers heavily use reflection in their apps for legitimate reasons, but also significant...
peer reviewedWe demonstrate the benefits of DroidRA, a tool for taming reflection in Android apps. D...
Reflection is a programming language feature that permits analysis and transformation of the behavio...
Within a few years, Android has been established as a leading platform in the mobile market with ove...
peer reviewedStatic analysis of Android applications can be hindered by the presence of the popular ...
Reflection is a language feature which allows to analyze and transform the behavior of classes at th...
In the last decade, smartphones have gained widespread usage. Since the advent of online application...
Recently, the number of available Android apps in Googles Play Store reached 2 million. Usually, And...
Application vetting at app stores and market places is the first line of defense to protect mobile e...
It is generally challenging to tell apart malware from benign applications. To make this decision, ...
Context: Static analysis exploits techniques that parse program source code or bytecode, often trave...
We present an approach and tool for general-purpose modeling of Android for static analysis. Our app...
Native code is now commonplace within Android app packages where it co-exists and interacts with Dex...
The recent past has shown that Android smartphones became the most popular target for malware author...