Many threats present in smartphones are the result of in-teractions between application components, not just ar-tifacts of single components. However, current tech-niques for identifying inter-application communication are ad hoc and do not scale to large numbers of ap-plications. In this paper, we reduce the discovery of inter-component communication (ICC) in smartphones to an instance of the Interprocedural Distributive Envi-ronment (IDE) problem, and develop a sound static anal-ysis technique targeted to the Android platform. We ap-ply this analysis to 1,200 applications selected from the Play store and characterize the locations and substance of their ICC. Experiments show that full specifications for ICC can be identified for over 93 %...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Play. ...
We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform ...
Many threats present in smartphones are the result of in-teractions between application components, ...
peer reviewedMany threats present in smartphones are the result of interactions between application ...
Part 8: Mobile and Cloud Services SecurityInternational audienceAndroid apps are made of components ...
Security threats using intent based inter component communication (ICC) channels in Android are unde...
The success of the Android OS in its user base as well as in its developer base can partly be attrib...
peer reviewedInter-Component Communication (ICC) is a key mechanism in Android. It enables developer...
A central aspect of the Android platform is Inter-Component Communication (ICC), which allows the re...
Android is widely used for the development and deployment of autonomous and smart systems, including...
Abstract—In the Android operating system, each application consists of a set of components that comm...
Abstract—We present PCLeaks, a tool based on inter-component communication (ICC) vulnerabilities to ...
Abstract—Over the last three years, Android has established itself as the largest-selling operating ...
Android Inter-Component Communication (ICC) is complex, largely unconstrained, and hard for develope...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Play. ...
We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform ...
Many threats present in smartphones are the result of in-teractions between application components, ...
peer reviewedMany threats present in smartphones are the result of interactions between application ...
Part 8: Mobile and Cloud Services SecurityInternational audienceAndroid apps are made of components ...
Security threats using intent based inter component communication (ICC) channels in Android are unde...
The success of the Android OS in its user base as well as in its developer base can partly be attrib...
peer reviewedInter-Component Communication (ICC) is a key mechanism in Android. It enables developer...
A central aspect of the Android platform is Inter-Component Communication (ICC), which allows the re...
Android is widely used for the development and deployment of autonomous and smart systems, including...
Abstract—In the Android operating system, each application consists of a set of components that comm...
Abstract—We present PCLeaks, a tool based on inter-component communication (ICC) vulnerabilities to ...
Abstract—Over the last three years, Android has established itself as the largest-selling operating ...
Android Inter-Component Communication (ICC) is complex, largely unconstrained, and hard for develope...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Play. ...
We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform ...