2017
DOI: 10.1007/978-3-662-54970-4_13
|View full text |Cite
|
Sign up to set email alerts
|

CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(19 citation statements)
references
References 16 publications
0
19
0
Order By: Relevance
“…If the difference is not large and there is a relatively large standard deviation, then we indicate that the app is highly variable; otherwise, the app's privacy is labeled as similar. 16 Using this approach, we calculated the following fractions of apps in each category: better (26.3%), worse (51.1%), similar (9.5%) and variable (13.1%). Thus, while a quarter of apps are getting better with respect to privacy, twice as many are getting worse over time and only a small fraction stay the same.…”
Section: B Combining Dimensionsmentioning
confidence: 99%
See 2 more Smart Citations
“…If the difference is not large and there is a relatively large standard deviation, then we indicate that the app is highly variable; otherwise, the app's privacy is labeled as similar. 16 Using this approach, we calculated the following fractions of apps in each category: better (26.3%), worse (51.1%), similar (9.5%) and variable (13.1%). Thus, while a quarter of apps are getting better with respect to privacy, twice as many are getting worse over time and only a small fraction stay the same.…”
Section: B Combining Dimensionsmentioning
confidence: 99%
“…While taint tracking can ensure coverage of all PII leaks (even those that are obfuscated), it requires some form of interaction with running apps to trigger leaks. Typically, researchers use automated "UI monkeys" [33], [44] for random exploration or more structured approaches [16], [37] to generate synthetic user actions; however, prior work showed that this can underestimate PII leaks compared to manual (human) interactions [50].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…(1) Behavioral Modeling: Mariconti et al's MAMADROID [26] builds from static analysis, a behavioral model of malware samples, relying on the sequences of abstracted API calls; this yields higher accuracy than state of the art, while also providing higher resilience to API changes and reducing the need to re-train models. (2) Input Generators: previous work [4,9,24] has introduced input generators that aim to mimic app usage by humans, more effectively than the standard Android pseudorandom input generator (Monkey), thus improving the chances of triggering malicious code during execution. (3) Hybrid Analysis: by combining static and dynamic analysis, hybrid analysis has been used to try and get the best of the two worlds, typically, following two possible strategies.…”
Section: Introductionmentioning
confidence: 99%
“…One approach is to use static analysis to gather information about the apps under analysis (e.g., intent filters an app listens for, execution paths to specific API calls, etc.) and then ensuring that all execution paths of interest are triggered during the dynamic analysis stage [9,40]; in the other, features extracted using static analysis (e.g., permissions, API calls, etc.) are combined with those from dynamic analysis (e.g., file access, networking events, etc.…”
Section: Introductionmentioning
confidence: 99%