Klein, Jacques ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Le Traon, Yves ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
External co-authors :
yes
Language :
English
Title :
ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis
Publication date :
May 2015
Event name :
International Conference on ICT Systems Security and Privacy Protection (SEC 2015)
Event date :
from 26-05-2015 to 28-05-2015
Audience :
International
Main work title :
International Conference on ICT Systems Security and Privacy Protection (SEC 2015)
Allix, K., Jerome, Q., Bissyande, T.F., Klein, J., State, R., Traon, Y.L.: A forensic analysis of android malware-how is malware written and how it could be detected? In: COMPSAC. IEEE (2014)
Arzt, S., Rasthofer, S., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: Flowdroid: Precise context, flow, field, object-sensitive and lifecycleaware taint analysis for android apps. In: PLDI 2014 (2014)
Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R., Shastry, B.: Towards taming privilege-escalation attacks on android. In: NDSS (2012)
Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: MobiSys. ACM, New York (2011)
Cui, X., Yu, D., Chan, P., Hui, L.C., Yiu, S., Qing, S.: Cochecker: Detecting capability and sensitive data leaks from component chains in android. In: ACISP 2014 (2014)
Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege escalation attacks on android. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346–360. Springer, Heidelberg (2011)
Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Communications of the ACM 20(7), 504–513 (1977)
Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In: OSDI (2010)
Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: USENIX Security (2011)
Fuchs, A.P., Chaudhuri, A., Foster, J.S.: Scandroid: Automated security certification of android applications. Univ. of Maryland, Manuscript (2009)
Haris, M., Haddadi, H., Hui, P.: Privacy leakage in mobile computing: Tools, methods, and characteristics (2014). arXiv preprint arXiv:1410.4978
Klieber, W., Flynn, L., Bhosale, A., Jia, L., Bauer, L.: Android taint flow analysis for app sets. In: SOAP@PLDI, pp. 1–6. ACM (2014)
La Polla, M., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. IEEE Communications Surveys & Tutorials 15(1) 446–471
Lam, P., Bodden, E., Lhoták, O., Hendren, L.: The soot framework for java program analysis: a retrospective. In: CETUS (2011)
Li, L., Bartel, A., Bissyandé, T.F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., Mcdaniel, P.: IccTA: detecting inter-component privacy leaks in android apps. In: ICSE (2015)
Li, L., Bartel, A., Klein, J., Le Traon, Y.: Automatically exploiting potential component leaks in android applications. In: TrustCom. IEEE (2014)
Octeau, D., McDaniel, P., Jha, S., Bartel, A., Bodden, E., Klein, J., Le Traon, Y.: Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis. In: USENIX Security (2013)
Wagner, D., Dean, D.: Intrusion detection via static analysis. In: S&P (2001)
Wei, F., Roy, S., Ou, X., et al.: Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps. In: CCS (2014)
Wu, L., Grace, M., Zhou, Y., Wu, C., Jiang, X.: The impact of vendor customizations on android security. In: CCS, pp. 623–634. ACM (2013)
Zhou, Y., Jiang, X.: Detecting passive content leaks and pollution in android applications. In: NDSS (2013)