Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
Today's smartphones are a ubiquitous source of private and confidential data. At the same
time, smartphone users are plagued by carelessly programmed apps that leak important …
time, smartphone users are plagued by carelessly programmed apps that leak important …
Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps
We present a new approach to static analysis for security vetting of Android apps and a
general framework called Amandroid. Amandroid determines points-to information for all …
general framework called Amandroid. Amandroid determines points-to information for all …
Apposcopy: Semantics-based detection of android malware through static analysis
We present Apposcopy, a new semantics-based approach for identifying a prevalent class of
Android malware that steals private user information. Apposcopy incorporates (i) a high …
Android malware that steals private user information. Apposcopy incorporates (i) a high …
Checking app behavior against app descriptions
How do we know a program does what it claims to do? After clustering Android apps by their
description topics, we identify outliers in each cluster with respect to their API usage. A" …
description topics, we identify outliers in each cluster with respect to their API usage. A" …
Asdroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction
Android smartphones are becoming increasingly popular. The open nature of Android
allows users to install miscellaneous applications, including the malicious ones, from third …
allows users to install miscellaneous applications, including the malicious ones, from third …
Data flow based behavioral analysis on mobile devices
V Sridhara, SAK Gathala, R Gupta - US Patent 9,607,146, 2017 - Google Patents
Methods, devices and systems for detecting suspicious or performance-degrading mobile
device behaviors intelligently, dynamically, and/or adaptively determine computing device …
device behaviors intelligently, dynamically, and/or adaptively determine computing device …
" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …
Scalable and precise taint analysis for android
We propose a type-based taint analysis for Android. Concretely, we present DFlow, a
context-sensitive information flow type system, and DroidInfer, the corresponding type …
context-sensitive information flow type system, and DroidInfer, the corresponding type …
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes
Most application code evolves incrementally, and especially so when being maintained after
the applications have been deployed. Yet, most data-flow analyses do not take advantage of …
the applications have been deployed. Yet, most data-flow analyses do not take advantage of …
Static analysis of implicit control flow: Resolving java reflection and android intents (t)
Implicit or indirect control flow is a transfer of control between procedures using some
mechanism other than an explicit procedure call. Implicit control flow is a staple design …
mechanism other than an explicit procedure call. Implicit control flow is a staple design …