System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation
暂无分享,去创建一个
Jian Liu | Kai Chen | Neng Gao | Peng Liu | Chen Cao | Min Yang | Limin Liu | Lannan Luo | Qiang Zeng | Xinyu Xing | Peng Liu | Kai Chen | Xinyu Xing | Chen Cao | Qiang Zeng | Neng Gao | Limin Liu | Lannan Luo | Min Yang | Jian Liu
[1] Koushik Sen,et al. DART: directed automated random testing , 2005, PLDI '05.
[2] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[3] Dawson R. Engler,et al. EXE: automatically generating inputs of death , 2006, CCS '06.
[4] Jacques Klein,et al. Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis , 2013 .
[5] Peng Liu,et al. Achieving accuracy and scalability simultaneously in detecting application clones on Android markets , 2014, ICSE.
[6] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[7] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[8] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[9] Peng Wang,et al. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale , 2015, USENIX Security Symposium.
[10] Michael R. Lowry,et al. Combining unit-level symbolic execution and system-level concrete execution for testing nasa software , 2008, ISSTA '08.
[11] Dawson R. Engler,et al. Practical, Low-Effort Equivalence Verification of Real Code , 2011, CAV.
[12] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[13] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[14] David Brumley,et al. AEG: Automatic Exploit Generation , 2011, NDSS.
[15] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[16] Zhuoqing Morley Mao,et al. Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework , 2016, NDSS.
[17] Sam Malek,et al. Testing android apps through symbolic execution , 2012, ACM SIGSOFT Softw. Eng. Notes.
[18] Hongseok Yang,et al. Automated concolic testing of smartphone apps , 2012, SIGSOFT FSE.
[19] Christopher Krügel,et al. EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework , 2015, NDSS.
[20] Yuan Zhang,et al. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection , 2013, CCS.
[21] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[22] Corina S. Pasareanu,et al. Symbolic PathFinder: integrating symbolic execution with model checking for Java bytecode analysis , 2013, Automated Software Engineering.
[23] John C. S. Lui,et al. TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime , 2016, CCS.
[24] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[25] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[26] Erik Derr,et al. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis , 2016, USENIX Security Symposium.
[27] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[28] Sam Malek,et al. SIG-Droid: Automated system input generation for Android applications , 2015, 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE).
[29] Mukul R. Prasad,et al. Automated testing with targeted event sequence generation , 2013, ISSTA.
[30] Manuel Costa,et al. Bouncer: securing software by blocking bad input , 2008, WRAITS '08.
[31] George Candea,et al. S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.
[32] William Enck,et al. AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY.
[33] Jacques Klein,et al. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[34] Franck van Breugel,et al. Automatic handling of native methods in Java PathFinder , 2014, SPIN.
[35] Klaus Havelund,et al. Model Checking Programs , 2004, Automated Software Engineering.
[36] David Brumley,et al. Automatic exploit generation , 2014, CACM.
[37] Dawson R. Engler,et al. Under-constrained execution: making automatic code destruction easy and scalable , 2007, ISSTA '07.
[38] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[39] Sarfraz Khurshid,et al. Generalized Symbolic Execution for Model Checking and Testing , 2003, TACAS.
[40] David Brumley,et al. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[41] Dawson R. Engler,et al. Under-Constrained Symbolic Execution: Correctness Checking for Real Code , 2015, USENIX Annual Technical Conference.
[42] Yulong Zhang,et al. Towards Discovering and Understanding Task Hijacking in Android , 2015, USENIX Security Symposium.
[43] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[44] Sencun Zhu,et al. Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection , 2014, SIGSOFT FSE.
[45] Jacques Klein,et al. Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis , 2013, USENIX Security Symposium.