Proceedings of the 11th ACM Conference on Security &Amp; Privacy in Wireless and Mobile Networks 2018
DOI: 10.1145/3212480.3212504
|View full text |Cite
|
Sign up to set email alerts
|

Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…By deploying NetMon to Google Play for a crowdsourcing study, we are among the first in this line of research. Other related works include Netalyzr [75] for studying middleboxes in cellular networks, FBS-Radar [56] for uncovering fake base stations in the wild, UpDroid [74] for monitoring sensitive API behaviors on nonrooted devices, and Haystack [69] for detecting mobile apps' privacy leakage via on-device app traffic analysis [80].…”
Section: Related Workmentioning
confidence: 99%
“…By deploying NetMon to Google Play for a crowdsourcing study, we are among the first in this line of research. Other related works include Netalyzr [75] for studying middleboxes in cellular networks, FBS-Radar [56] for uncovering fake base stations in the wild, UpDroid [74] for monitoring sensitive API behaviors on nonrooted devices, and Haystack [69] for detecting mobile apps' privacy leakage via on-device app traffic analysis [80].…”
Section: Related Workmentioning
confidence: 99%
“…In our analysis, for the first time in the literature, we find that non-movable interrupts, such as softirqs and rescheduling interrupts, play an important role in leaking application information. This finding is important as nearly all prior work studying interruptbased side channels [43,68] focuses on movable interrupts such as graphics and network interrupts. Linux provides convenient interfaces to block information leakage due to movable interrupts by isolating them from potential attackers.…”
Section: Introductionmentioning
confidence: 89%
“…In Linux, all reported interrupts are counted by the kernel and logged in the system file /proc/interrupts, which can be accessed by any process. Several attacks exploit such statistical information to monitor application activities [68], monitor keystroke timings and user behaviors on touch screens [15], and detect website content [48]. Fortunately, these attacks are easy to mitigate as one could simply disable non-privileged access to the interrupt pseudo-file.…”
Section: Related Work 71 Interrupt-related Attacksmentioning
confidence: 99%
“…Our on-device fuzzing in Sect. 4.1 is related to the general Android dynamic testing [44][45][46][47][48]. For example, SMV-Hunter [44] and FileCross [45] leveraged Android adb commands to dynamically test Android apps' security vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…AppIntent [46], further instrumented Android operating system for the effective dynamic testing of Android apps. Two crowdsourcing apps, UpDroid [47] and NetMon [48], were recently proposed to leverage crowds' user interaction for dynamic app tests in the wild. Besides general Android dynamic testing, the closest work to our Intent fuzzing is Intent-Fuzzer [49], which also leveraged Drozer for Intent fuzzing.…”
Section: Related Workmentioning
confidence: 99%