Boxify: Full-fledged app sandboxing for stock android
We present the first concept for full-fledged app sandboxing on stock Android. Our approach
is based on application virtualization and process-based privilege separation to securely …
is based on application virtualization and process-based privilege separation to securely …
Taintman: An art-compatible dynamic taint analysis framework on unmodified and non-rooted android devices
Dynamic taint analysis (DTA), as a mainstream information flow tracking technique, has
been widely used in mobile security. On the Android platform, the existing DTA approaches …
been widely used in mobile security. On the Android platform, the existing DTA approaches …
Appguard–fine-grained policy enforcement for untrusted android applications
Android's success makes it a prominent target for malicious software. However, the user has
very limited control over security-relevant operations. This work presents AppGuard, a …
very limited control over security-relevant operations. This work presents AppGuard, a …
A logical key hierarchy based approach to preserve content privacy in decentralized online social networks
Distributed Online Social Networks (DOSNs) have been proposed to shift the control over
user data from a unique entity, the online social network provider, to the users of the DOSN …
user data from a unique entity, the online social network provider, to the users of the DOSN …
Stateful data usage control for android mobile devices
Modern mobile devices allow their users to download data from the network, such as
documents or photos, to store local copies and to use them. Many real scenarios would …
documents or photos, to store local copies and to use them. Many real scenarios would …
[PDF][PDF] CAPEF: Context-aware policy enforcement framework for Android applications
The notion of Context-Awareness of mobile applications is drawing more attention, where
many applications need to adapt to physical environments of users and devices, such as …
many applications need to adapt to physical environments of users and devices, such as …
CryptoShield-Automatic On-Device Mitigation for Crypto API Misuse in Android Applications
F Draschbacher, J Feichtner - Proceedings of the 2023 ACM Asia …, 2023 - dl.acm.org
Misuse of cryptographic APIs remains one of the most common flaws in Android
applications. The complexity of cryptographic APIs frequently overwhelms developers. This …
applications. The complexity of cryptographic APIs frequently overwhelms developers. This …
[PDF][PDF] ArtHook: Callee-side method hook injection on the new Android runtime art
M Wißfeld - 2015 - publications.cispa.saarland
Hooking methods on Android's Dalvik runtime has become a common technique for various
use cases, including security and privacy extensions. Android 5.0 introduced the new ahead …
use cases, including security and privacy extensions. Android 5.0 introduced the new ahead …
Test complement exclusion: Guarantees from dynamic analysis
A Zeller - 2015 IEEE 23rd International Conference on …, 2015 - ieeexplore.ieee.org
Modern test generation techniques allow to generate as many executions as needed,
combined with dynamic analysis, they allow for understanding program behavior in …
combined with dynamic analysis, they allow for understanding program behavior in …
A2P2-An Android Application Patching Pipeline Based On Generic Changesets
F Draschbacher - Proceedings of the 18th International Conference on …, 2023 - dl.acm.org
Inspecting and manipulating runtime behavior of Android applications is a common need in
mobile security research. However, existing tools lack a holistic application-agnostic …
mobile security research. However, existing tools lack a holistic application-agnostic …