2015
DOI: 10.1007/978-3-319-24953-7_17
|View full text |Cite
|
Sign up to set email alerts
|

EviCheck: Digital Evidence for Android

Abstract: Abstract. We present EviCheck, a tool for the verification, certification and generation of lightweight fine-grained security policies for Android. It applies static analysis to check the conformance between an application and a given policy. A distinguishing feature of EviCheck is its ability to generate digital evidence: a certificate for the analysis algorithm asserting the conformance between the application and the policy. This certificate can be independently checked by another component (tool) to valida… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…a) Implementation: We have implemented the checker, which runs on mobile devices, as part of our tool EviCheck [24] 2 . EviCheck accepts apps directly in bytecode (APK) format and uses Androguard [12] as back-end for parsing them.…”
Section: Implementation and Experimentsmentioning
confidence: 99%
See 1 more Smart Citation
“…a) Implementation: We have implemented the checker, which runs on mobile devices, as part of our tool EviCheck [24] 2 . EviCheck accepts apps directly in bytecode (APK) format and uses Androguard [12] as back-end for parsing them.…”
Section: Implementation and Experimentsmentioning
confidence: 99%
“…Hence, we are able to directly perform it on mobile devices which are relatively limited in terms of resources. We have extended our tool EviCheck [24] with this new operational scheme (check on device). We report on the results obtained for a set of real-world applications.…”
Section: Introductionmentioning
confidence: 99%
“…In other words: it exists at least one method matching c from which r is transitively called (reachable). To address such a query, we compute the transitive closure of the call graph [9]. We propagate permissions (APIs) backwards from callees to callers until we reach a fixpoint.…”
Section: Application Abstractionmentioning
confidence: 99%
“…Our work complements such tools by providing the automatic means for inferring the properties to be checked. Hence, DroidGen can serve as a front-end for a verification tool such as EviCheck [9] to keep the user completely out of the loop.…”
Section: Related Workmentioning
confidence: 99%