Proceedings of the 2nd International Conference on Information Systems Security and Privacy 2016
DOI: 10.5220/0005686603070316
|View full text |Cite
|
Sign up to set email alerts
|

Tracking Explicit and Control Flows in Java and Native Android Apps Code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…In our approach, the malicious process is installed in the personnel computer and not in the device. Many dynamic taint analysis approaches defined in smartphones like TaintDroid [7], AppFence [15] and Graa et al [11], [9] allow detection of sensitive data leakage by third party applications running in the Android device using the data tainting. Wang et al [28] enforce security policies on data flows for Android applications to prevent unauthorized usb hardware flows.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…In our approach, the malicious process is installed in the personnel computer and not in the device. Many dynamic taint analysis approaches defined in smartphones like TaintDroid [7], AppFence [15] and Graa et al [11], [9] allow detection of sensitive data leakage by third party applications running in the Android device using the data tainting. Wang et al [28] enforce security policies on data flows for Android applications to prevent unauthorized usb hardware flows.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Dorazio et al [6] investigate how an attacker could exfiltrate data from a paired iOS device by abusing a library and a command line tool distributed with iTunes. Existing security tools [7], [8], [9], [10], [1] in Android systems focus on detection of the sensitive data leakage. While such tools may be effective in protecting against malicious third party applications installed in the Android systems, they are less suitable when the data exfiltration is performed by application installed in the personal computer requesting connection to the Android IoT device.…”
Section: Introductionmentioning
confidence: 99%