Reflection is a language feature which allows to analyze and transform the behavior of classes at the runtime. Reflection is used for software debugging and testing. Malware authors can leverage reflection to subvert the malware detection by static analyzers. Reflection initializes the class, invokes any method of class, or accesses any field of class. But, instead of utilizing usual programming language syntax, reflection passes classes/methods etc. as parameters to reflective APIs. As a consequence, these parameters can be constructed dynamically or can be encrypted by malware. These cannot be detected by state-of-the-art static tools. We propose EspyDroid, a system that combines dynamic analysis with code instrumentation for a more preci...
We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensiti...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Cryptography has been extensively used in Android applications to guarantee secure communications, c...
Reflection is a programming language feature that permits analysis and transformation of the behavio...
Android developers heavily use reflection in their apps for legitimate reasons. However, reflection ...
Similar to the PC world, the abundance of mobile malware has become a serious threat to smartphone u...
The rapid increase in mobile malware and deployment of over-privileged applications over the years h...
According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted a...
Android is a popular mobile-device platform developed by Google. Android’s application model is desi...
Mobile malware has recently become an acute problem. Existing solutions either base static reasoning...
The increasing number of repeated malware penetrations into official mobile app markets poses a high...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
Since more than 96% of mobile malware targets on Android platform, various techniques based on stati...
The Android platform is designed to facilitate inter-app integration and communication, so that apps...
It is generally challenging to tell apart malware from benign applications. To make this decision, ...
We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensiti...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Cryptography has been extensively used in Android applications to guarantee secure communications, c...
Reflection is a programming language feature that permits analysis and transformation of the behavio...
Android developers heavily use reflection in their apps for legitimate reasons. However, reflection ...
Similar to the PC world, the abundance of mobile malware has become a serious threat to smartphone u...
The rapid increase in mobile malware and deployment of over-privileged applications over the years h...
According to Google, Android now runs on 1.4 billion devices. The growing popularity has attracted a...
Android is a popular mobile-device platform developed by Google. Android’s application model is desi...
Mobile malware has recently become an acute problem. Existing solutions either base static reasoning...
The increasing number of repeated malware penetrations into official mobile app markets poses a high...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
Since more than 96% of mobile malware targets on Android platform, various techniques based on stati...
The Android platform is designed to facilitate inter-app integration and communication, so that apps...
It is generally challenging to tell apart malware from benign applications. To make this decision, ...
We propose a type-based taint analysis for Android. Con-cretely, we present DFlow, a context-sensiti...
Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smar...
Cryptography has been extensively used in Android applications to guarantee secure communications, c...