Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis 2019
DOI: 10.1145/3293882.3339001
|View full text |Cite
|
Sign up to set email alerts
|

Androlic: an extensible flow, context, object, field, and path-sensitive static analysis framework for Android

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…We have implemented the approach of misuse detection on Async-Task into a tool named AsyncChecker. It is written in Java based on Androlic [44], a flow, context, object, field-sensitive static analysis framework. As figure 2 shows, AsyncChecker generates the class hierarchy relation and dummy main method for subsequent analysis.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We have implemented the approach of misuse detection on Async-Task into a tool named AsyncChecker. It is written in Java based on Androlic [44], a flow, context, object, field-sensitive static analysis framework. As figure 2 shows, AsyncChecker generates the class hierarchy relation and dummy main method for subsequent analysis.…”
Section: Methodsmentioning
confidence: 99%
“…More specifically, the state of AsyncTask changes in accordance with operations, which can be processed with typestate analysis [56]. Based on Androlic [44], the analysis approach can be easily extended for similar problems.…”
Section: Android Static Analysismentioning
confidence: 99%
“…The drawback to building the model directly into the analysis is that adding or updating behaviors [Huang et al 2018] requires modifying the analysis itself. The most common approach to model callback orders is by generating an artificial main method [Arzt and Bodden 2016;Arzt et al 2014;Gordon et al 2015;Hu and Neamtiu 2018;Pan et al 2019]. An artificial main method has the advantage that modeling can be decoupled from the program analysis by generating code that enforces a callback order to link with the application.…”
Section: Related Workmentioning
confidence: 99%
“…The technologies of malware detection are divided into three categories: static analysis, dynamic analysis, and hybrid analysis [5]. Static analysis decomposes Android Application Package (APK) files by reverse engineering and extracts various features from the disassembly code without running source code [6][7][8]. It has high accuracy and efficiency in detecting known malicious code, but has high false negative in detecting unknown malicious code because it cannot deal with code confusion and dynamic code loading.…”
Section: Introductionmentioning
confidence: 99%