FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps
暂无分享,去创建一个
Jacques Klein | Yves Le Traon | Eric Bodden | Patrick D. McDaniel | Alexandre Bartel | Steven Arzt | Siegfried Rasthofer | Damien Octeau | Christian Fritz | P. Mcdaniel | Damien Octeau | Alexandre Bartel | E. Bodden | Jacques Klein | Y. L. Traon | Siegfried Rasthofer | Steven Arzt | Christian Fritz | Christian G Fritz
[1] Eric Bodden,et al. SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks , 2013 .
[2] J. Foster,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[3] Ondrej Lhoták,et al. The Soot framework for Java program analysis: a retrospective , 2011 .
[4] L. Cavallaro,et al. A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors , 2013 .
[5] Hao Chen,et al. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale , 2012, TRUST.
[6] Fernando C. Colón Osorio,et al. “TrustDroid™”: Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking , 2012, 2012 7th International Conference on Malicious and Unwanted Software.
[7] Xuxian Jiang,et al. Unsafe exposure analysis of mobile in-app advertisements , 2012, WISEC '12.
[8] Atanas Rountev,et al. IDE Dataflow Analysis in the Presence of Large Object-Oriented Libraries , 2008, CC.
[9] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[10] Ondrej Lhoták,et al. Practical Extensions to the IFDS Algorithm , 2010, CC.
[11] Sahin Albayrak,et al. Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications , 2011, 2011 6th International Conference on Malicious and Unwanted Software.
[12] Mira Mezini,et al. Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[13] Thomas W. Reps,et al. Precise Interprocedural Dataflow Analysis with Applications to Constant Propagation , 1995, TAPSOFT.
[14] Eric Bodden,et al. Inter-procedural data-flow analysis with IFDS/IDE and Soot , 2012, SOAP '12.
[15] Jacques Klein,et al. Dexpler: converting Android Dalvik bytecode to Jimple for static analysis with Soot , 2012, SOAP '12.
[16] Shay Artzi,et al. F4F: taint analysis of framework-based web applications , 2011, OOPSLA '11.
[17] Jacques Klein,et al. Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis , 2013 .
[18] Avik Chaudhuri,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[19] Trent Jaeger,et al. Implicit Flows: Can't Live with 'Em, Can't Live without 'Em , 2008, ICISS.
[20] Ondrej Lhoták,et al. Scaling Java Points-to Analysis Using SPARK , 2003, CC.
[21] Yves Le Traon,et al. Automatically securing permission-based software by reducing the attack surface: an application to Android , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[22] Jacques Klein,et al. Highly precise taint analysis for Android applications , 2013 .
[23] Patrick Cousot,et al. Andromeda: Accurate and Scalable Security Analysis of Web Applications , 2013, FASE.
[24] Jacques Klein,et al. Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis , 2013, USENIX Security Symposium.
[25] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[26] Eric Bodden,et al. A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks , 2014, NDSS.
[27] K. Yi,et al. Static Analyzer for Detecting Privacy Leaks in Android Applications , 2012 .
[28] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[29] Roksana Boreli,et al. On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[30] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[31] Ross J. Anderson,et al. Aurasium: Practical Policy Enforcement for Android Applications , 2012, USENIX Security Symposium.
[32] Yannis Smaragdakis,et al. Efficient and Effective Handling of Exceptions in Java Points-to Analysis , 2013, CC.
[33] Zhemin Yang,et al. LeakMiner: Detect Information Leakage on Android with Static Taint Analysis , 2012, 2012 Third World Congress on Software Engineering.
[34] Artem Starostin,et al. A framework for static detection of privacy leaks in android applications , 2012, SAC '12.
[35] Thomas W. Reps,et al. Precise interprocedural dataflow analysis via graph reachability , 1995, POPL '95.
[36] Isil Dillig,et al. Precise reasoning for programs using containers , 2011, POPL '11.
[37] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.