Filters








301 Hits in 3.0 sec

Automated Multi-Layered Bytecode Generation for Preventing Sensitive Information Leaks from Android Applications

Geochang Jeon, Minseong Choi, Sunjun Lee, Jeong Hyun Yi, Haehyun Cho
2021 IEEE Access  
INDEX TERMS Sensitive information leaks, obfuscation, android security, code protection.  ...  Sensitive information leakages from applications are a critical issue in the Android ecosystem.  ...  Attackers abuse the repackaging policy of Android that allows an application to re-distribute to third-party markets with a different developer's signature.  ... 
doi:10.1109/access.2021.3107601 fatcat:moufnteu6fabrpc5xqpv36sfoe

Monet: A User-oriented Behavior-based Malware Variants Detection System for Android [article]

Mingshen Sun, Xiaolei Li, John C.S. Lui, Richard T.B. Ma, Zhenkai Liang
2016 arXiv   pre-print
The backend server is responsible for large scale malware detection.  ...  Android, the most popular mobile OS, has around 78% of the mobile market share. Due to its popularity, it attracts many malware attacks.  ...  In addition, because of the permission abuse problem [11] - [13] , malware can still find its way to attack many Android devices.  ... 
arXiv:1612.03312v1 fatcat:jrd4eke62zelzpakbzwhmeeba4

On Understanding Permission Usage Contextuality in Android Apps [chapter]

Md Zakir Hossen, Mohammad Mannan
2018 Lecture Notes in Computer Science  
For example, Android apps can be obfuscated using various obfuscation tools (e.g., ProGuard [12] ) during the build process.  ...  For example, apps can record audio in native C++ through the JNI. Android Runtime This module includes the Android Runtime (ART) and a set of core libraries of Java programming language.  ... 
doi:10.1007/978-3-319-95729-6_15 fatcat:bptdirztfbckdooyvvxlhbl3u4

Android Security: A Review

Omar Ahmed, Amira Sallow
2017 Academic Journal of Nawroz University  
Smartphones are used by billions of people that means the applications of the smartphone is increasing, it is out of control for applications marketplaces to completely validate if an application is malicious  ...  Therefore, it is up to users to choose for themselves whether an application is safe to use or not.  ...  The Android runtime has an element named Dalvik Virtual Machine (DVM), which is an interpreter for byte code that has been converted from Java Virtual Machine (JVM) particularly designed and enhanced for  ... 
doi:10.25007/ajnu.v6n3a97 fatcat:fp7yhttrc5hava57zpd34j7moi

Android Security: A Review

Omar Ahmed, Amira Sallow
2017 Academic Journal of Nawroz University  
Smartphones are used by billions of people that means the applications of the smartphone is increasing, it is out of control for applications marketplaces to completely validate if an application is malicious  ...  Therefore, it is up to users to choose for themselves whether an application is safe to use or not.  ...  The Android runtime has an element named Dalvik Virtual Machine (DVM), which is an interpreter for byte code that has been converted from Java Virtual Machine (JVM) particularly designed and enhanced for  ... 
doi:10.25007/ajnu.v6n3a99 fatcat:pfesub6c2zaabe636bbhxcrd2y

Mapping System Level Behaviors with Android APIs via System Call Dependence Graphs [article]

Bin Zhao
2019 arXiv   pre-print
Though Android provides multiple security features and layers to protect user data and system resources, there are still some over-privileged applications in Google Play Store or third-party Android app  ...  Due to Android's open source feature and low barriers to entry for developers, millions of developers and third-party organizations have been attracted into the Android ecosystem.  ...  Hence, for malicious Android applications, it is usually not possible for them to conduct sensitive actions without triggering system calls, even if they use obfuscation or polymorphism techniques [32  ... 
arXiv:1906.10238v1 fatcat:u24utk5h4jckximfu22rkjiy6i

Toward Engineering a Secure Android Ecosystem

Meng Xu, Chenxiong Qian, Sangho Lee, Taesoo Kim, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee
2016 ACM Computing Surveys  
Based on our collection of knowledge, we envision a blueprint for engineering a secure, next-generation Android ecosystem.  ...  The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things.  ...  For example, DIVILAR [Zhou et al. 2014b] obfuscates Dalvik bytecode with a randomized virtual instruction set, and translates its obfuscated code with a customized interpreter at runtime.  ... 
doi:10.1145/2963145 fatcat:d5vhxpdywrevvbh4as6vvt576q

Teaching Android Mobile Security

Jean-François Lalande, Valérie Viet Triem Tong, Pierre Graux, Guillaume Hiet, Wojciech Mazurczyk, Habiba Chaoui, Pascal Berthomé
2019 Proceedings of the 50th ACM Technical Symposium on Computer Science Education - SIGCSE '19  
, and compilation because Android and iOS use a large variety of technologies for developing applications.  ...  We describe a set of comprehensive security laboratory courses covering various concepts, ranging from the application development perspective to a deep investigation of the Android Open Source Project  ...  The packer uses native code to unpack the payload at runtime. The obfuscated methods are decoded immediately before being called and are re-encoded when they return.  ... 
doi:10.1145/3287324.3287406 dblp:conf/sigcse/LalandeTGHMCB19 fatcat:7ie5p3ed55cmbemonlamp7u53u

Privacy Analysis of Android Applications: State-of-art and Literary Assessment

Gulshan Shrivastava, Prabhat Kumar
2017 Scalable Computing : Practice and Experience  
Unfortunately, at the same time, the prosperity of these applications also attracts abusers and malicious attackers to perform different types of attacks.  ...  Everything is available in the application market of android.  ...  Limitation 4: Android lacks a configurable, runtime ICC control for the following purposes: (a) To prevent an application from accessing any open interfaces of another application, despite the former having  ... 
doi:10.12694/scpe.v18i3.1304 fatcat:c4flyid3gfe45n4adqr2fosinm

Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps [chapter]

Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu
2015 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Our evaluation shows that Dagger can effectively vet sensitive behaviors in apps, especially for those using complex obfuscation techniques.  ...  More specifically, Dagger uses three types of low-level execution information at runtime: system calls, Android Binder transactions, and app process details.  ...  Introduction With the proliferation of Android smartphones and applications, there is a growing interest in scalable tools and techniques for blackbox testing of applications.  ... 
doi:10.1007/978-3-319-28865-9_4 fatcat:enuvfzcm7zcofn4csqsanmk3ve

GreatEatlon: Fast, Static Detection of Mobile Ransomware [chapter]

Chengyu Zheng, Nicola Dellarocca, Niccolò Andronio, Stefano Zanero, Federico Maggi
2017 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
benign features for malicious purposes.  ...  Last but not least, the performance overhead of current approaches is unacceptable for appstore-scale workloads.  ...  Interestingly, in an e↵ort to hinder abuse of such APIs for permanent screen locking, the upcoming major release of Android (7.0, code-named "Nougat") eliminates [13] the possibility of creating device-admin  ... 
doi:10.1007/978-3-319-59608-2_34 fatcat:tcugpbxvyfejrmnp7jwpy5bcte

Screening Smartphone Applications Using Behavioral Signatures [chapter]

Suyeon Lee, Jehyun Lee, Heejo Lee
2013 IFIP Advances in Information and Communication Technology  
We evaluated our mechanism with 1,759 randomly collected real-world Android applications including 79 variants of 4 malware families.  ...  We propose a variant detection mechanism using runtime semantic signature.  ...  Data Set For the performance evaluation, we gathered 79 variants on four famous malicious Android applications and 1,680 legitimate applications published in real world.  ... 
doi:10.1007/978-3-642-39218-4_2 fatcat:7guqwssyrfafhd4gnhge54ulei

Compile-time Code Virtualization for Android Applications

Yujie Zhao, Zhanyong Tang, Guixin Ye, Dongxu Peng, Dingyi Fang, Xiaojiang Chen, Zheng Wang
2020 Computers & security  
By replacing the program instructions with virtual instructions that an adversary is unfamiliar with, code obfuscation based on virtualization is a promising way of protecting Android applications against  ...  Infringing intellectual property by reverse analysis is a severe threat to Android applications.  ...  Starting with Android 5.0 (Lollipop), ART has completely replaced Dalvik VM as the runtime system for Android 1 .  ... 
doi:10.1016/j.cose.2020.101821 fatcat:bjgsenkfq5abvisvuezwmwotoe

Hidden in Plain Sight: Obfuscated Strings Threatening Your Privacy [article]

Leonid Glanz, Patrick Müller, Lars Baumgärtner, Michael Reif, Sven Amann, Pauline Anthonysamy, Mira Mezini
2020 arXiv   pre-print
In this paper, we show that most of the string obfuscation techniques found in malicious and benign applications for Android can easily be broken in an automated fashion.  ...  String obfuscation is an established technique used by proprietary, closed-source applications to protect intellectual property.  ...  Introduction Obfuscation protects applications against abusive practices (e.g., repackaging) but also hides malicious intent (e.g., malware) [17, 37] .  ... 
arXiv:2002.04540v1 fatcat:tmijyr5y6jbm7kfjz7d2s7nufy

FineDroid: Enforcing Permissions with System-Wide Application Execution Context [chapter]

Yuan Zhang, Min Yang, Guofei Gu, Hao Chen
2015 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
We build a prototype system on Android, named FineDroid, to track such context during the application execution.  ...  We demonstrate the benefits of FineDroid by instantiating several security extensions based on the policy framework, for two potential users: administrators and developers.  ...  Note that application obfuscation [6] would not cause problems here, because developers could modify the manifest file after code obfuscation.  ... 
doi:10.1007/978-3-319-28865-9_1 fatcat:27k3zfwalba4tehul6kn6dqfgi
« Previous Showing results 1 — 15 out of 301 results