A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is application/pdf
.
Filters
On the effectiveness of API-level access control using bytecode rewriting in Android
2013
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13
This work is the first systematic study on the effectiveness of using bytecode rewriting for API-level access control. ...
We have provided a systematic evaluation to assess the effectiveness of API-level access control using bytecode rewriting on Android Operating System. ...
EFFECTIVENESS OF API LEVEL ACCESS CONTROL To measure the effectiveness of the API-level access control using the methods described above, we need to understand what it is trying to protect and how these ...
doi:10.1145/2484313.2484317
dblp:conf/ccs/HaoSD13
fatcat:geln44uynngopptsdqdne6y7ba
URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security
[chapter]
2013
Lecture Notes in Computer Science
URANOS is an Android application which uses syntactical static analysis to determine in which component of an Android application a permission is required. ...
We show, how users can trigger bytecode rewriting to (de)activate selected or redundant permissions in Android applications without sacrificing functionality. ...
Acknowledgements The research leading to these results has received funding from the European Union's FP7 project COMPOSE, under grant agreement 317862. ...
doi:10.1007/978-3-642-38530-8_4
fatcat:oxlkx7uur5f7vftsnkbhiukoda
RetroSkeleton
2013
Proceeding of the 11th annual international conference on Mobile systems, applications, and services - MobiSys '13
automatic app localization, informing users of hidden behavior in apps, and updating apps depending on outdated APIs. ...
We show that our system is capable of supporting a variety of useful policies, including providing flexible fine-grained network access control, building HTTPS-Everywhere functionality into apps, implementing ...
Their work is based on a specialized replacement for some privacy-sensitive APIs and use Dalvik bytecode rewriting to modify apps to use their replacement API. ...
doi:10.1145/2462456.2464462
dblp:conf/mobisys/DavisC13
fatcat:sgzumimvyneodc5hdendkoc46a
Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps
2015
Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services - MobiSys '15
Our system, PEDAL, contains a novel machine classifier for detecting ad libraries even in the presence of obfuscated code, and techniques for automatically instrumenting bytecode to effect privilege de-escalation ...
We evaluate PEDAL on a large set of apps from the Google Play store and demonstrate that it has a 98% accuracy in detecting ad libraries and imposes less than 1% runtime overhead on apps. ...
Acknowledgements We would like to thank our shepherd, Landon Cox, and the anonymous referees, for their insightful suggestions for improving the technical content and presentation of the paper. ...
doi:10.1145/2742647.2742668
dblp:conf/mobisys/LiuLJG15
fatcat:z7d2klkvgna5xoeoq6fse4ulqa
Efficient, context-aware privacy leakage confinement for android applications without firmware modding
2014
Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14
Besides, no effective mechanism is in place to distinguish malicious privacy leakage from those of legitimate uses. In this paper, we take a bytecode rewriting approach. ...
As Android has become the most prevalent operating system in mobile devices, privacy concerns in the Android platform are increasing. ...
In our experiment, we prepare a set of specific libraries which consist of Android SDK of API level 16 (Android 4.1, Jelly Bean), Google Maps of API level 16, Google Analytics SDK v2 and Google Admob SDK ...
doi:10.1145/2590296.2590312
dblp:conf/ccs/ZhangY14
fatcat:v65b5sfrrrfvlbi6g6taxubbea
Hybrid User-level Sandboxing of Third-party Android Apps
2015
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15
AppCage leverages two complimentary user-level sandboxes to interpose and regulate an app's access to sensitive APIs. ...
In this paper, we propose AppCage, a system that thoroughly confines the run-time behavior of third-party Android apps without requiring framework modifications or root privilege. ...
This work was supported in part by the US National Science Foundation (NSF) under Grants 0855036 and 0952640. ...
doi:10.1145/2714576.2714598
dblp:conf/ccs/ZhouPWWJ15
fatcat:w5iqqjqyp5g2jozmif7ffa5zqu
Sensor Guardian: prevent privacy inference on Android sensors
2017
EURASIP Journal on Information Security
In this paper, we present Sensor Guardian, a privacy protection system that mitigates this threat on Android by hooking and controlling applications' access to sensors. ...
control. which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons ...
JY participated in the Sensor Guardian's design and revised the manuscript. YW analyzed the experiment results and wrote the final version of the manuscript. ...
doi:10.1186/s13635-017-0061-8
fatcat:bguwnyw65rdtjhmzcbj6fin6je
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management
[chapter]
2017
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
As for functionalities, a BYOD solution should isolate an arbitrary number of entities, such as those relating to business and personal uses and provide fine-grained access control on multi-entity management ...
Diverse personal devices are used to access enterprise resources, and deployment of the solutions with customized operating system (OS) dependency will thus be restricted. ...
To eliminate the side effect of Android garbage collection when calculating memory usage, we used the tool dumpsys in Android Debug Bridge (adb) to get the maximal memory usage during the execution of ...
doi:10.1007/978-3-319-59608-2_1
fatcat:tmlogodjhvd4dmhlf7dvwksisu
Dr. Android and Mr. Hide
2012
Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '12
We used these strategies to investigate fine-grained versions of five of the most common Android permissions, including access to the Internet, user contacts, and system settings. ...
Google's Android platform includes a permission model that protects access to sensitive capabilities, such as Internet access, GPS use, and telephony. ...
Acknowledgements Thanks to Yixin Zhu for technical contributions to a precursor of this work and to Philip Phelps for help with the microbenchmarking app. ...
doi:10.1145/2381934.2381938
dblp:conf/ccs/JeonMVFRFM12
fatcat:3e6merthejgm7hyynikr75zhsq
Malicious Behavior Monitoring for Android Applications
2016
International Journal of Network Security
For those suspicious applications, based on the reverse engineering, embed monitoring Smali code for those sensitive APIs such as sending SMS, accessing user location, device ID, phone number, etc. ...
From experiments, it shows that almost 26% applications in Android market have privacy leakage risks. And our proposed method is feasible and effective for monitoring these kind of malicious behavior. ...
The authors gratefully acknowledge the anonymous reviewers for their valuable comments. ...
dblp:journals/ijnsec/QianCXZ16
fatcat:p5k5iql4cjgwhf62afkwfn4z2m
AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware
[chapter]
2015
Lecture Notes in Computer Science
Its core technique is a bytecode decrypting and Dalvik executable (DEX) reassembling method, which is able to recover any protected bytecode effectively without the knowledge of the packer. ...
A thorough investigation on 37,688 Android malware samples is conducted to take statistics of how widespread are those samples protected by Android packers. ...
Acknowledgments We would like to thank our shepherd, Elias Athanasopoulos, and the anonymous reviewers for their insightful comments that greatly helped improve the manuscript of this paper. ...
doi:10.1007/978-3-319-26362-5_17
fatcat:xoxyebbexncjrhlagqkdje7oxe
Android Platform Modeling and Android App Verification in the ACL2 Theorem Prover
[chapter]
2016
Lecture Notes in Computer Science
We present our work in using the ACL2 theorem prover to formally model the Android platform and to formally verify Android apps. ...
Our formal Android model is an executable simulator of a growing subset of the Android platform, and app proofs are done by automated symbolic execution of the app's event handlers using the formal model ...
The proof methodology described in this paper, based on state machines and simulations, can verify a large class of app properties. ...
doi:10.1007/978-3-319-29613-5_11
fatcat:s7zqxdbnejhszjiyblwm4c5rpa
In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments
[article]
2013
arXiv
pre-print
Both prototypes improve the privacy of Android systems thanks to in-vivo bytecode instrumentation. ...
In this paper we claim that an efficient and readily applicable means to improve privacy of Android applications is: 1) to perform runtime monitoring by instrumenting the application bytecode and 2) in-vivo ...
[20] presented an Android Application rewriting framework prototype, and discussed its use for monitoring an application, and for implementing fine-grained Access Control. ...
arXiv:1208.4536v2
fatcat:xvldrfefrfh3zlkoqwszkoyxxy
Towards self-healing smartphone software via automated patching
2014
Proceedings of the 29th ACM/IEEE international conference on Automated software engineering - ASE '14
In the recovery stage, we use bytecode rewriting to alter app behavior as to avoid such situations in the future. ...
Experiments on several real-world, popular Android apps and bugs show that our approach manages to recover the apps from crashes effectively, timely, and without introducing overhead. ...
The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory ...
doi:10.1145/2642937.2642955
dblp:conf/kbse/AzimNM14
fatcat:4hdsy7qmr5c75cj4ackvs5vjey
AppGuard – Fine-Grained Policy Enforcement for Untrusted Android Applications
[chapter]
2014
Lecture Notes in Computer Science
The utility of AppGuard has already been demonstrated by more than 1,000,000 downloads. Android's security concept is based on isolation of third-party apps and access control [1] . ...
-Our evaluation on typical Android apps has shown very little overhead in terms of space and runtime. ...
and the Emmy Noether program of the German federal government. ...
doi:10.1007/978-3-642-54568-9_14
fatcat:oeino6qcrrcw3a7c57rkldvyhe
« Previous
Showing results 1 — 15 out of 301 results