Filters








3 Hits in 4.1 sec

DroidPill

Chaoting Xuan, Gong Chen, Erich Stuntebeck
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
the Android Application Framework.  ...  In this paper, we explore a new hacking technique called the App Confusion Attack, which allows hackers to take full control of benign apps and their resources without device rooting or privilege escalation  ...  Existing Solutions Boxify [22] and NJAS [23] are two existing app virtualization systems that sandbox unmodified and untrusted apps in stock Android.  ... 
doi:10.1145/3052973.3052986 dblp:conf/ccs/XuanCS17 fatcat:j7c4c2dlcjegtidfxl4l4lwpim

An Android Inline Hooking Framework for the Securing Transmitted Data

Yu-an Tan, Shuo Feng, Xiaochun Cheng, Yuanzhang Li, Jun Zheng
2020 Sensors  
Besides, the commonly used Android hook frameworks cannot meet the requirement of hooking the native methods in shared libraries on non-root devices.  ...  Beyond that, this study combines this approach with VirtualXposed which aims to run it without root privileges.  ...  App sandboxing is an important means of sandboxing unmodified apps in non-rooted devices on stock Android.  ... 
doi:10.3390/s20154201 pmid:32731597 fatcat:hg5ebtoui5gcvprasgkzujmp4q

Retrofitting privacy controls to stock Android [article]

Philipp Von Styp-Rekowsky, Universität Des Saarlandes
2021
to ordinary, stock Android devices.  ...  Shortly after the publication of our work in 2015, Bianchi et al. presented NJAS [9] , an alternative approach to application sandboxing on Android.  ... 
doi:10.22028/d291-33474 fatcat:m7s3lp6xqvhmrdjdjwqrv6bcwi