Proceedings of the 12th International on Conference on Emerging Networking EXperiments and Technologies 2016
DOI: 10.1145/2999572.2999596
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Automatic Protocol Behavior Analysis for Android Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 39 publications
0
8
0
Order By: Relevance
“…The SVM classifier used for static analysis achieved 93.33 to 99.28 percent accuracy, while the Naive Bayes used for dynamic analysis achieved accuracy up to 90 percent. Furthermore, Kim et al [13], used the J48 machine learning classier, the features are selected from static (permission ) and dynamic (APICal l). A. Saracino el al.…”
Section: Hybrid Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The SVM classifier used for static analysis achieved 93.33 to 99.28 percent accuracy, while the Naive Bayes used for dynamic analysis achieved accuracy up to 90 percent. Furthermore, Kim et al [13], used the J48 machine learning classier, the features are selected from static (permission ) and dynamic (APICal l). A. Saracino el al.…”
Section: Hybrid Analysismentioning
confidence: 99%
“…The client uses the strace mechanism of the Linux system for monitoring android system calls. Kim et al [13], proposed CopperDroid framework, which detects the behaviour of Java code and local code execution. Although, these reported methods are very effective, yet, these methods can not be directly applied to mobile and IoT devices, because of their limited resources such as memory and power consumption.…”
Section: Introductionmentioning
confidence: 99%
“…In order to extract the Jimple slices, we implement a forward and backward slicing algorithm (see Appendix A), which are based on the networkaware program slicing approach proposed by Choi et al [29,30]. The slicing algorithm works bidirectionally based on the ICFG constructed in the previous step.…”
Section: Program Slicermentioning
confidence: 99%
“…In this case, a dependency exists between responseA and requestB. To identify this, we leverage the taint-based approach proposed by Choi et al [29,30], in which the dependency is determined by identifying the data flow from the source (line (1) in responseA) to the sink (line (1) in requestB). Finally, the program slicer records Jimple slices consisting of HTTP request/response and its dependencies for the next step, in which code snippets meeting the three conditions for vulnerability to remote code injection attacks are identified.…”
Section: Fileoutputstreamwrite()mentioning
confidence: 99%
“…Mariconti et al detect malware by building Markov models of the applications, but this approach requires downloading and executing the byte code of the application [13]. Kim et al mine the network protocols of an application from its executable, but the deployment of this approach is intractable in SDN networks [14]. Finally, Xia et al audit Android applications at runtime [15], and Ren et al propose an approach for discovering personal data in the network traffic of an application [16]; however, these approaches do not include automatic adjustments or the verification of network policies.…”
Section: Related Workmentioning
confidence: 99%