2015
DOI: 10.1145/2858965.2814274
|View full text |Cite
|
Sign up to set email alerts
|

Interactively verifying absence of explicit information flows in Android apps

Abstract: App stores are increasingly the preferred mechanism for distributing software, including mobile apps (Google Play), desktop apps (Mac App Store and Ubuntu Software Center), computer games (the Steam Store), and browser extensions (Chrome Web Store). The centralized nature of these stores has important implications for security. While app stores have unprecedented ability to audit apps, users now trust hosted apps, making them more vulnerable to malware that evades detection and finds its way onto the app store… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 63 publications
0
1
0
Order By: Relevance
“…Although we have added extensions that support threading classes such as AsyncTask, Thread, and Runnable, it is not complete. Discovering Android's implicit callbacks is an active area of research, and a number of studies [37][38][39] are currently devoted to addressing this issue.…”
Section: Limitationsmentioning
confidence: 99%
“…Although we have added extensions that support threading classes such as AsyncTask, Thread, and Runnable, it is not complete. Discovering Android's implicit callbacks is an active area of research, and a number of studies [37][38][39] are currently devoted to addressing this issue.…”
Section: Limitationsmentioning
confidence: 99%