The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2017
DOI: 10.1109/dsn.2017.14
|View full text |Cite
|
Sign up to set email alerts
|

DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 27 publications
0
15
0
Order By: Relevance
“…Furthermore, as to be evaluated in Sec. III-C3, our crowdsourcing is much more effective in terms of port discovery than typical Android static analysis, which cannot handle dynamic code loading [65], [67], complex implicit flows [43], [66], and advanced code obfuscation [46], [78].…”
Section: Discovery Via Crowdsourcingmentioning
confidence: 99%
See 2 more Smart Citations
“…Furthermore, as to be evaluated in Sec. III-C3, our crowdsourcing is much more effective in terms of port discovery than typical Android static analysis, which cannot handle dynamic code loading [65], [67], complex implicit flows [43], [66], and advanced code obfuscation [46], [78].…”
Section: Discovery Via Crowdsourcingmentioning
confidence: 99%
“…In particular, 25.1% of them use dynamic code loading [65] or advanced code obfuscation [78]. They are therefore not possibly detected by a pure static analysis [46], [67]. This indicates that crowdsourcing is much more effective than Android static analysis in the context of open port discovery.…”
Section: ) Open Ports In Popular Appsmentioning
confidence: 99%
See 1 more Smart Citation
“…Because ClickScanner cannot fetch the content of the code, it is impossible to know whether this code is used to perform click fraud. Hence, one future direction of this research is to support context-based static analysis to infer the purpose of the loaded code or instruction and analyze the dynamically loaded code using tools like DyDroid [37]. Limitation 2: Other types of ad views.…”
Section: Case 3 Humanoid Attack Through Infected Ad Sdksmentioning
confidence: 99%
“…Dynamic loading: Android supports applications to load additional binaries at run time by dynamic loading. In order to evade static detection, malicious application developers separate the core functionality of the application into independent libraries and load them dynamically [27]. erefore, malicious applications always employ dynamic loading to hide malicious behavior.…”
Section: The Features Of Malicious Applicationsmentioning
confidence: 99%