Boxify: Full-fledged app sandboxing for stock android

M Backes, S Bugiel, C Hammer, O Schranz… - 24th USENIX Security …, 2015 - usenix.org
We present the first concept for full-fledged app sandboxing on stock Android. Our approach
is based on application virtualization and process-based privilege separation to securely …

Taintman: An art-compatible dynamic taint analysis framework on unmodified and non-rooted android devices

W You, B Liang, W Shi, P Wang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Dynamic taint analysis (DTA), as a mainstream information flow tracking technique, has
been widely used in mobile security. On the Android platform, the existing DTA approaches …

Appguard–fine-grained policy enforcement for untrusted android applications

M Backes, S Gerling, C Hammer, M Maffei… - … Workshop, DPM 2013 …, 2014 - Springer
Android's success makes it a prominent target for malicious software. However, the user has
very limited control over security-relevant operations. This work presents AppGuard, a …

A logical key hierarchy based approach to preserve content privacy in decentralized online social networks

A De Salve, R Di Pietro, P Mori… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Distributed Online Social Networks (DOSNs) have been proposed to shift the control over
user data from a unique entity, the online social network provider, to the users of the DOSN …

Stateful data usage control for android mobile devices

A Lazouski, F Martinelli, P Mori, A Saracino - International Journal of …, 2017 - Springer
Modern mobile devices allow their users to download data from the network, such as
documents or photos, to store local copies and to use them. Many real scenarios would …

[PDF][PDF] CAPEF: Context-aware policy enforcement framework for Android applications

S Inshi, M Elarbi, R Chowdhury, H Ould-Slimane… - J. Eng. Res …, 2023 - academia.edu
The notion of Context-Awareness of mobile applications is drawing more attention, where
many applications need to adapt to physical environments of users and devices, such as …

CryptoShield-Automatic On-Device Mitigation for Crypto API Misuse in Android Applications

F Draschbacher, J Feichtner - Proceedings of the 2023 ACM Asia …, 2023 - dl.acm.org
Misuse of cryptographic APIs remains one of the most common flaws in Android
applications. The complexity of cryptographic APIs frequently overwhelms developers. This …

[PDF][PDF] ArtHook: Callee-side method hook injection on the new Android runtime art

M Wißfeld - 2015 - publications.cispa.saarland
Hooking methods on Android's Dalvik runtime has become a common technique for various
use cases, including security and privacy extensions. Android 5.0 introduced the new ahead …

Test complement exclusion: Guarantees from dynamic analysis

A Zeller - 2015 IEEE 23rd International Conference on …, 2015 - ieeexplore.ieee.org
Modern test generation techniques allow to generate as many executions as needed,
combined with dynamic analysis, they allow for understanding program behavior in …

A2P2-An Android Application Patching Pipeline Based On Generic Changesets

F Draschbacher - Proceedings of the 18th International Conference on …, 2023 - dl.acm.org
Inspecting and manipulating runtime behavior of Android applications is a common need in
mobile security research. However, existing tools lack a holistic application-agnostic …