References of "Conti, Mauro"
     in
Bookmark and Share    
See detailProceedings of the 15th International Workshop on Security and Trust Management (STM 2019)
Mauw, Sjouke UL; Conti, Mauro

Book published by Springer (2019)

Detailed reference viewed: 62 (2 UL)
Full Text
Peer Reviewed
See detailPOSTER: Detection of Information Leaks via Reflection in Android Apps
Gajrani, Jyoti; Li, Li UL; Laxmi, Vijay et al

in The 2017 ACM on Asia Conference on Computer and Communications Security (AsiaCCS 2017) (2017)

Reflection is a language feature which allows to analyze and transform the behavior of classes at the runtime. Reflection is used for software debugging and testing. Malware authors can leverage ... [more ▼]

Reflection is a language feature which allows to analyze and transform the behavior of classes at the runtime. Reflection is used for software debugging and testing. Malware authors can leverage reflection to subvert the malware detection by static analyzers. Reflection initializes the class, invokes any method of class, or accesses any field of class. But, instead of utilizing usual programming language syntax, reflection passes classes/methods etc. as parameters to reflective APIs. As a consequence, these parameters can be constructed dynamically or can be encrypted by malware. These cannot be detected by state-of-the-art static tools. We propose EspyDroid, a system that combines dynamic analysis with code instrumentation for a more precise and automated detection of malware employing reflection. We evaluate EspyDroid on 28 benchmark apps employing major reflection categories. Our technique show improved results over FlowDroid via detection of additional undetected flows. These flows have potential to leak sensitive and private information of the users, through various sinks. [less ▲]

Detailed reference viewed: 118 (4 UL)