Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security 2022
DOI: 10.1145/3488932.3497765
|View full text |Cite
|
Sign up to set email alerts
|

Driving Execution of Target Paths in Android Applications with (a) CAR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…Wong et al [34] proposed a framework using a usercentric anomaly detection method to detect invalid data dependencies between user input arguments and sensitive features. The asynchronous characteristics of the Android Application Programming Interface (API) and the ICC are considered to investigate control flow analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Wong et al [34] proposed a framework using a usercentric anomaly detection method to detect invalid data dependencies between user input arguments and sensitive features. The asynchronous characteristics of the Android Application Programming Interface (API) and the ICC are considered to investigate control flow analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Other techniques use static analysis to discover dependencies between different application components, and use it during the dynamic exploration [15], [43], [25], [38], [23], [14]. Another guided exploration technique CAR [45] uses a static constraint analysis to keep the symbolic execution scalable and obviate the need for whole program symbolic execution. In contrast, COLUMBUS aims to maximize coverage similar to other app testing tools limiting the scope of the symbolic execution only within the callback and sets up the environment in an underconstrained manner.…”
Section: Related Workmentioning
confidence: 99%