A Practical Intent Fuzzing Tool for Robustness of Inter-Component Communication in Android Apps
暂无分享,去创建一个
[1] Hui Ye,et al. DroidFuzzer: Fuzzing the Android Apps with Intent-Filter Tag , 2013, MoMM '13.
[2] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[3] Yuexiang Yang,et al. Crafting Intents to Detect ICC Vulnerabilities of Android Apps , 2016, 2016 12th International Conference on Computational Intelligence and Security (CIS).
[4] John Regehr,et al. Intent fuzzer: crafting intents of death , 2014, WODA+PERTEA 2014.
[5] Daniel S. Hirschberg,et al. A linear space algorithm for computing maximal common subsequences , 1975, Commun. ACM.
[6] Marco Pistoia,et al. Dynamic detection of inter-application communication vulnerabilities in Android , 2015, ISSTA.
[7] Jan S. Rellermeyer,et al. An empirical study of the robustness of Inter-component Communication in Android , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).
[8] Kun Yang,et al. IntentFuzzer: detecting capability leaks of android applications , 2014, AsiaCCS.