171 Hits in 2.8 sec

Java decompiler diversity and its application to meta-decompilation

Nicolas Harrand, César Soto-Valero, Martin Monperrus, Benoit Baudry
2020 Journal of Systems and Software  
During compilation from Java source code to bytecode, some information is irreversibly lost. In other words, compilation and decompilation of Java code is not symmetric.  ...  Different Java decompilers use distinct strategies to achieve proper decompilation.  ...  Acknowledgments This work has been partially supported by the Wallenberg Autonomous Systems and Software Program (WASP) funded by Knut and Alice Wallenberg Foundation and by the TrustFull project funded  ... 
doi:10.1016/j.jss.2020.110645 fatcat:6pn3tj2ecrh2bdxubvy7kur26a

The Strengths and Behavioral Quirks of Java Bytecode Decompilers

Nicolas Harrand, Cesar Soto-Valero, Martin Monperrus, Benoit Baudry
2019 2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM)  
During compilation from Java source code to bytecode, some information is irreversibly lost. In other words, compilation and decompilation of Java code is not symmetric.  ...  Modern Java decompilers tend to use distinct strategies to achieve proper decompilation.  ...  ACKNOWLEDGMENTS This work has been partially supported by the Wallenberg Autonomous Systems and Software Program (WASP) funded by Knut and Alice Wallenberg Foundation and by the TrustFull project financed  ... 
doi:10.1109/scam.2019.00019 dblp:conf/scam/HarrandSMB19 fatcat:gxcqkrlc3ncjboeueac2wnipam

Rapid Android Parser for Investigating DEX files (RAPID)

Xiaolu Zhang, Frank Breitinger, Ibrahim Baggili
2016 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
In this article, we present Rapid Android Parser for Investigating DEX files (RAPID) which is an open source and easy-to-use JAVA library for parsing DEX files.  ...  In order to analyze Android applications, tools decompress APK files and extract relevant data from the Dalvik EXecutable (DEX) files.  ...  not sure if malware and benign samples differed significantly, which could lead to potential RAPID errors -our goal was to have diverse Android application coverage in order generalize the validity and  ... 
doi:10.1016/j.diin.2016.03.002 fatcat:u3ufza3ifbchxnezr4tgi3v2ve

Equivalent Version Sets Testing Method for Android Applications based on Code Analysis

Song Huang
2019 International Journal of Performability Engineering  
It analyzes the decompiled code that identifies the code related to the Android SDK version and then generates the corresponding test cases.  ...  Moreover, the method coverage of these applications increased by an average of 49.3% on all versions and 46.8% on equivalent test runtime-environment-set, respectively.  ...  The decompiled files can be reprogramed, recompiled, and packaged to achieve the purpose of personalized customization. Through the decompiling app, we can obtain the java code like Figure 3 .  ... 
doi:10.23940/ijpe.19.07.p28.20082018 fatcat:4gag67vegfd2fot646jpzecagy

Code Coverage Measurement for Android Dynamic Analysis Tools

Chun-Ying Huang, Ching-Hsiang Chiu, Chih-Hung Lin, Han-Wei Tzeng
2015 2015 IEEE International Conference on Mobile Services  
It is common to inspect an Android application using static or dynamic analysis techniques.  ...  Most traditional tools adopt static analysis techniques due to its low cost and high performance properties.  ...  ) file and do the decompilation.  ... 
doi:10.1109/mobserv.2015.38 dblp:conf/mobserv/HuangCLT15 fatcat:gu5dhn7oyfhrzk4sdcr5t6fqfu

Runtime bytecode transformation for Smalltalk

Marcus Denker, Stéphane Ducasse, Éric Tanter
2006 Computer languages, systems & structures  
We illustrate the use of BYTESURGEON via the implementation of method wrappers and a simple MOP, and report on its efficiency.  ...  Transforming programs to alter their semantics is of wide interest, for purposes as diverse as off-the-shelf component adaptation, optimization, trace generation, and experimentation with new language  ...  Acknowledgements We thank David Röthlisberger and the anonymous ESUG 2005 reviewers for their comments.  ... 
doi:10.1016/ fatcat:lw4wgo6qfrd7zj24pbcznn7kfy

Slicing droids

Johannes Hoffmann, Martin Ussath, Thorsten Holz, Michael Spreitzenbarth
2013 Proceedings of the 28th Annual ACM Symposium on Applied Computing - SAC '13  
Considering these aspects, it is evident that malicious apps need to be detected early on in order to prevent further distribution and infections.  ...  SAAF analyzes smali code, a disassembled version of the DEX format used by Android's Java VM implementation.  ...  We would like to thank Tilman Bender, Christian Kröger, and Hanno Lemoine for their work on SAAF. SAAF is written in Java and its source code can be found at  ... 
doi:10.1145/2480362.2480706 dblp:conf/sac/HoffmannUHS13 fatcat:yetwhzjmkbajtpvyhnap6ksrj4

Enter Sandbox: Android Sandbox Comparison [article]

Sebastian Neuner, Victor van der Veen, Martina Lindorfer, Markus Huber, Georg Merzdovnik, Martin Mulazzani, Edgar Weippl
2014 arXiv   pre-print
Our results indicate a low level of diversity in analysis platforms resulting from code reuse that leaves the evaluated systems vulnerable to evasion.  ...  These platforms differ heavily in terms of feature support and application properties being analyzed.  ...  We gratefully acknowledge funding and support by the Christian Doppler Gesellschaft, A1 Telekom Austria AG, Drei-Banken-EDV GmbH, LG Nexera Business Solutions AG, and NXP Semiconductors Austria GmbH.  ... 
arXiv:1410.7749v1 fatcat:uh67vr2eyvajdcts62mjodjb24

A Smart Framework for Mobile Botnet Detection Using Static Analysis

2020 KSII Transactions on Internet and Information Systems  
The prototype was implemented and used to validate the performance, accuracy, and scalability of the proposed framework by evaluating 3000 android applications.  ...  This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications.  ...  The same procedure was applied to decompile the classes.DEX files, which are the java source code. 4.2.  ... 
doi:10.3837/tiis.2020.06.015 fatcat:3kidu7f3ivdc5hknkoadkhnf4i

Darwin: a static analysis dataset of malicious and benign Android apps

Nuthan Munaiah, Casey Klimkowsky, Shannon McRae, Adam Blaine, Samuel A. Malachowsky, Cesar Perez, Daniel E. Krutz
2016 Proceedings of the International Workshop on App Market Analytics - WAMA 2016  
Each app was analyzed using several static analysis tools to collect a variety of quality and security related information.  ...  Unfortunately, Android apps are not immune to issues that plague conventional software including security vulnerabilities, bugs, and permission-based problems.  ...  To better detect and defend against malware, we need to understand more about it: how it is created, evolves, and its common characteristics.  ... 
doi:10.1145/2993259.2993264 dblp:conf/sigsoft/MunaiahKMBMPK16 fatcat:itsgtv6favffnk2jsnflc3bhrq

A New Feature Selection Method Based on a Self-Variant Genetic Algorithm Applied to Android Malware Detection

Le Wang, Yuelin Gao, Shanshan Gao, Xin Yong
2021 Symmetry  
The experimental results show good performance of the algorithm, in addition to which we apply the algorithm to a practical Android software classification problem and the results also show the superiority  ...  The processing of high-dimensional feature datasets increases the time and space complexity of computer processing and reduces the accuracy of classification models.  ...  This may include administrative and technical support, or donations in kind (e.g., materials used for experiments). Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym13071290 fatcat:o7o4ufclu5fidjop23qhpbmwbq

A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices [article]

Ruitao Feng, Sen Chen, Xiaofei Xie, Guozhu Meng, Shang-Wei Lin, Yang Liu
2020 arXiv   pre-print
Meanwhile, it is a time-consuming task if the app is downloaded first and then uploaded to the server side for detection, because the network transmission has a lot of overhead.  ...  However, apart from the applications provided by the official market, apps from unofficial markets and third-party resources are always causing serious security threats to end-users.  ...  methods cause a lot of time due to the cost of decompiling and extracting from source code such as Java code and smali code.  ... 
arXiv:2005.04970v3 fatcat:55bxae3yv5bsrn74n6jvd4y6re

BAT2XML: XML-based Java Bytecode Representation

Michael Eichberg
2005 Electronical Notes in Theoretical Computer Science  
To solve the highlighted problems, we propose a higher-level XML-based representation of Java bytecode which is designed as a common platform for the creation and transformation of bytecode and explicitly  ...  The creation, transformation and analysis of bytecode is widespread. Nevertheless, several problems related to the reusability and comprehensibility of the results and tools exist.  ...  Acknowledgments The author would like to thank Tobias Schuh and Barbara Wasilewski for the implementation of the converter from XML to Java bytecode.  ... 
doi:10.1016/j.entcs.2005.02.035 fatcat:74i5oc366vg7di5athga27zlnq

HAWK: Rapid Android Malware Detection through Heterogeneous Graph Attention Networks [article]

Yiming Hei, Renyu Yang, Hao Peng, Lihong Wang, Xiaolin Xu, Jianwei Liu, Hong Liu, Jie Xu, Lichao Sun
2021 arXiv   pre-print
An incremental learning model is created to handle the applications that manifest dynamically, without the need for re-constructing the whole HIN and the subsequent embedding model.  ...  The model can pinpoint rapidly the proximity between a new application and existing in-sample applications and aggregate their numerical embeddings under various semantics.  ...  refers to an abstract data structure in Java.  ... 
arXiv:2108.07548v1 fatcat:wizwynfcmfhi5fkkll5c4kaof4

The Behavioral Diversity of Java JSON Libraries [article]

Nicolas Harrand, Thomas Durieux, David Broman, Benoit Baudry
2021 arXiv   pre-print
Its popularity has motivated significant software development effort to build multiple libraries to process JSON data.  ...  of 20 JSON libraries, in a single software ecosystem: Java/Maven.  ...  This work is partially supported by the Wallenberg AI, Autonomous Systems, and Software Program (WASP) funded by Knut and Alice Wallenberg Foundation and by the Trust-Full project funded by the Swedish  ... 
arXiv:2104.14323v2 fatcat:5yugua7jvvhsjm42nx6opb7dvm
« Previous Showing results 1 — 15 out of 171 results