2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE) 2019
DOI: 10.1109/icse.2019.00038
|View full text |Cite
|
Sign up to set email alerts
|

Towards Understanding and Reasoning About Android Interoperations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…al. [33] will be unsound. The unsoundness stems from the analyses' limitation to analyze the described callback communication methods, thus only supporting one-way communication from Android to JavaScript.…”
Section: Case Study: Information Flow From Javascript Tomentioning
confidence: 99%
See 2 more Smart Citations
“…al. [33] will be unsound. The unsoundness stems from the analyses' limitation to analyze the described callback communication methods, thus only supporting one-way communication from Android to JavaScript.…”
Section: Case Study: Information Flow From Javascript Tomentioning
confidence: 99%
“…Although evaluateJavascript is meant to only evaluate the passed JavaScript expression, it is also possible to mimic the functionality of loadUrl by manipulating DOM properties. Again, this makes the existing analyses [8,33] unsound. A more precise and sound analysis has to also consider the data-flow between Android and evaluateJavascript.…”
Section: Case Study -Liquidpaymentioning
confidence: 99%
See 1 more Smart Citation
“…HybriDroid, 40 implemented on top of WALA, 41 analyzes Java and JavaScript code seamlessly to detect programmer errors on interoperations and track data leakages across language boundaries. Bae et al 42 tackled the expensive analysis of HybriDroid and proposed a lightweight type system detecting the same kinds of programmer errors in Android hybrid apps. Jin et al 43 proposed static detection of code injection attacks from JavaScript to Java.…”
Section: Related Workmentioning
confidence: 99%
“…Shen et al [40] proposed a behavior detection method based on function and process algebra for the detection of privilege escalation attacks in Android Apps. To describe the interactions between Apps, [41] proposed a formal interoperability semantic to help understand and infer Android interoperations. In [42], a methodology based on formal methods was proposed to help understand and identify obfuscation codes.…”
Section: Related Workmentioning
confidence: 99%