A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Sound and precise malware analysis for android via pushdown reachability and entry-point saturation
2013
Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices - SPSM '13
Sound malware analysis of Android applications is challenging. First, object-oriented programs exhibit highly interprocedural, dynamically dispatched control structure. Second, the Android programming paradigm relies heavily on the asynchronous execution of multiple entry points. Existing analysis techniques focus more on the second challenge, while relying on traditional analytic techniques that suffer from inherent imprecision or unsoundness to solve the first. We present Anadroid, a static
doi:10.1145/2516760.2516769
dblp:conf/ccs/LiangKMLGAH13
fatcat:qv3dmzqocvbmxjbbazpsuzgruq