2023
DOI: 10.1109/access.2023.3240724
|View full text |Cite
|
Sign up to set email alerts
|

Execution Recording and Reconstruction for Detecting Information Flows in Android Apps

Abstract: Security researchers utilize taint analyses to uncover suspicious behaviors in Android apps. Current static taint analyzers cannot handle ICC, reflection, and lifecycles dependably, increasing the result verification cost. On the other hand, current dynamic taint trackers accurately detect execution paths. However, they depend on specific Android versions and modified devices, reducing their usability and applicability. In addition, they require app exercise every time running the taint analysis. This paper pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 37 publications
0
1
0
Order By: Relevance
“…Throughout this paper, we use the term "covert malicious activity" to refer to activities (like making phone calls, sending SMS, clicking pictures, or recording audio/video) initiated by an application without the user's explicit permission. Covert behavior may have undesired consequences due to monetary loss, information theft, and sensitive information leaks [4], [5]. An ICC-based component-interaction-based classification technique is proposed to detect misuse of hidden features not detectable by conventional antimalware tools.…”
Section: Introductionmentioning
confidence: 99%
“…Throughout this paper, we use the term "covert malicious activity" to refer to activities (like making phone calls, sending SMS, clicking pictures, or recording audio/video) initiated by an application without the user's explicit permission. Covert behavior may have undesired consequences due to monetary loss, information theft, and sensitive information leaks [4], [5]. An ICC-based component-interaction-based classification technique is proposed to detect misuse of hidden features not detectable by conventional antimalware tools.…”
Section: Introductionmentioning
confidence: 99%