International audienceToday, security is a requirement for smartphone operating systems that are used to store and handle sensitive information. How- ever, smartphone users usually download third-party applications that can leak personal data without user authorization. For this reason, the dynamic taint analysis mechanism is used to control the manipulation of private data by third-party apps [9]. But this technique does not detect control flows. In particular, untrusted applications can circumvent An- droid system and get privacy sensitive information through control flows. In this paper, we propose a hybrid approach that combines static and dynamic analysis to propagate taint along control dependencies in An- droid system. To evaluate th...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensiti...
Part 4: Operating System and Firmware SecurityInternational audienceMalicious third-party applicatio...
International audienceToday, security is a requirement for smartphone operating systems that are use...
Security in embedded systems such as smartphones requires protection of private data manipulated by ...
International audienceSecurity in embedded systems such as smartphones requires protection of confid...
International audienceThe dynamic taint analysis mechanism is used to protect sensitive data in the ...
Today’s smart phones are a ubiquitous source of private and confidential data. At the same time, sma...
International audienceIn Android systems, an attacker can obfuscate an application code to leak sens...
Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Nowadays, developing Android applications is becoming easier and simpler. More and more new applicat...
Android applications may leak privacy data carelessly or maliciously. In this work we perform inter...
The number of Android apps have grown explosively in recent years and the number of apps leaking pri...
The Android application ecosystem has thrived, with hundreds of thousands of applications (apps) ava...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensiti...
Part 4: Operating System and Firmware SecurityInternational audienceMalicious third-party applicatio...
International audienceToday, security is a requirement for smartphone operating systems that are use...
Security in embedded systems such as smartphones requires protection of private data manipulated by ...
International audienceSecurity in embedded systems such as smartphones requires protection of confid...
International audienceThe dynamic taint analysis mechanism is used to protect sensitive data in the ...
Today’s smart phones are a ubiquitous source of private and confidential data. At the same time, sma...
International audienceIn Android systems, an attacker can obfuscate an application code to leak sens...
Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Nowadays, developing Android applications is becoming easier and simpler. More and more new applicat...
Android applications may leak privacy data carelessly or maliciously. In this work we perform inter...
The number of Android apps have grown explosively in recent years and the number of apps leaking pri...
The Android application ecosystem has thrived, with hundreds of thousands of applications (apps) ava...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensiti...
Part 4: Operating System and Firmware SecurityInternational audienceMalicious third-party applicatio...