On the impact of sample duplication in machine-learning-based android malware detection
Malware detection at scale in the Android realm is often carried out using machine learning
techniques. State-of-the-art approaches such as DREBIN and MaMaDroid are reported to …
techniques. State-of-the-art approaches such as DREBIN and MaMaDroid are reported to …
Peep with a mirror: breaking the integrity of android app sandboxing via unprivileged cache side channel
Application sandboxing is a well-established security principle employed in the Android
platform to safeguard sensitive information. However, hardware resources, specifically the …
platform to safeguard sensitive information. However, hardware resources, specifically the …
Demystifying hidden sensitive operations in android apps
Security of Android devices is now paramount, given their wide adoption among consumers.
As researchers develop tools for statically or dynamically detecting suspicious apps …
As researchers develop tools for statically or dynamically detecting suspicious apps …
Iafdroid: Demystifying collusion attacks in android ecosystem via precise inter-app analysis
B Wang, C Yang, J Ma - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
Inter-app communication mechanism allows app developers to improve Android apps'
usability and provide users with rich functions via interacting with exposed components or …
usability and provide users with rich functions via interacting with exposed components or …
Characterizing sensor leaks in android apps
While extremely valuable to achieve advanced functions, mobile phone sensors can be
abused by attackers to implement malicious activities in Android apps, as experimentally …
abused by attackers to implement malicious activities in Android apps, as experimentally …
Variable-strength combinatorial testing of exported activities based on misexposure prediction
Exported Activity (EA), a kind of activities in Android apps that can be launched by external
components, is one of the most important inter-component communication (ICC) …
components, is one of the most important inter-component communication (ICC) …
DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data
Mobile apps are widely used and often process users' sensitive data. Many taint analysis
tools have been applied to analyze sensitive information flows and report data leaks in apps …
tools have been applied to analyze sensitive information flows and report data leaks in apps …
VenomAttack: automated and adaptive activity hijacking in Android
Activity hijacking is one of the most powerful attacks in Android. Though promising, all the
prior activity hijacking attacks suffer from some limitations and have limited attack …
prior activity hijacking attacks suffer from some limitations and have limited attack …
Shelving it rather than Ditching it: Dynamically Debloating DEX and Native Methods of Android Applications without APK Modification
Today's Android developers tend to include numerous features to accommodate diverse
user requirements, which inevitably leads to bloated apps. Yet more often than not, only a …
user requirements, which inevitably leads to bloated apps. Yet more often than not, only a …
An In-Depth Analysis of Android's Java Class Library: its Evolution and Security Impact
Android is an operating system widely deployed especially on devices such as
smartphones. In this paper, we study the evolution of OpenJDK Java Class Library (JCL) …
smartphones. In this paper, we study the evolution of OpenJDK Java Class Library (JCL) …