A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications
2014
Proceedings 2014 Network and Distributed System Security Symposium
unpublished
The design of the Android system allows applications to load additional code from external sources at runtime. On the one hand, malware can use this capability to add malicious functionality after it has been inspected by an application store or anti-virus engine at installation time. On the other hand, developers of benign applications can inadvertently introduce vulnerabilities. In this paper, we systematically analyze the security implications of the ability to load additional code in
doi:10.14722/ndss.2014.23328
fatcat:izmjrgx74fgnjekt5pm5w3cxfm