2012 Third World Congress on Software Engineering 2012
DOI: 10.1109/wcse.2012.26
|View full text |Cite
|
Sign up to set email alerts
|

LeakMiner: Detect Information Leakage on Android with Static Taint Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
78
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 152 publications
(82 citation statements)
references
References 5 publications
0
78
0
Order By: Relevance
“…Multiple prior works use static analysis to detect intracomponent privacy leaks in Android apps [7], [22], [26], [35], [47]. AndroidLeaks [22] and LeakMiner [47] state the ability to handle the Android lifecycle including callback methods, but the two tools are not context-sensitive which precludes the precise analysis of many practical scenarios.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Multiple prior works use static analysis to detect intracomponent privacy leaks in Android apps [7], [22], [26], [35], [47]. AndroidLeaks [22] and LeakMiner [47] state the ability to handle the Android lifecycle including callback methods, but the two tools are not context-sensitive which precludes the precise analysis of many practical scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…AndroidLeaks [22] and LeakMiner [47] state the ability to handle the Android lifecycle including callback methods, but the two tools are not context-sensitive which precludes the precise analysis of many practical scenarios. However, those tools are not able to detect ICC leaks.…”
Section: Related Workmentioning
confidence: 99%
“…As these results illustrate, DroidSafe implements an analysis of unprecedented accuracy and precision. To the best of our knowledge, DroidSafe provides the first usable information-flow analysis for Android applications [7][8][9][10][11][12][13][14].…”
Section: Droidsafementioning
confidence: 99%
“…SCanDroid [11] resolves data flows between components using a limited model of Android, and conservative flow policies for API methods. LeakMiner [12] tracks flows with a context-insensitive analysis. AndroidLeaks [13] combines both context-sensitive and context insensitive analyses, but models flows through API methods with a blanket policy that reduces precision.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation