2022 IEEE Symposium on Security and Privacy (SP) 2022
DOI: 10.1109/sp46214.2022.9833764
|View full text |Cite
|
Sign up to set email alerts
|

FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 57 publications
0
5
0
Order By: Relevance
“…Similar, Yang et al [13] developed a hybrid solution, named FSAFlow, that has better precision than the static analysis tool FlowDroid or the dynamic approach Taint-Droid [92]. FSAFlow uses a finite state machine for monitoring the execution paths of an AUT and provides a statereduction strategy to optimise the analysis process.…”
Section: B Dynamic Taint Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Similar, Yang et al [13] developed a hybrid solution, named FSAFlow, that has better precision than the static analysis tool FlowDroid or the dynamic approach Taint-Droid [92]. FSAFlow uses a finite state machine for monitoring the execution paths of an AUT and provides a statereduction strategy to optimise the analysis process.…”
Section: B Dynamic Taint Analysismentioning
confidence: 99%
“…A particular challenge is to guide dynamic analysis techniques towards an exhaustive exploration of possible program paths [8], [9], [10], [11], [12]. Hybrid approaches combine both static and dynamic analyses, and have been shown to outperform solutions that rely solely on either of both approaches in certain cases [13].…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…InputScope [28] uses a static taint analysis to mark user input and monitor its propagation to identify user input validations that can expose hidden secrets such as backdoors and blacklists. Path tracking [29], taint value graph analysis [30], and hybrid analysis [31] are proposed to quickly detect malicious privacy leakage. IFA itself does not provide an automatic judgment of whether the revealed information flow path is malicious, and what kind of information disclosure is malicious needs to be specified by experts.…”
Section: Related Workmentioning
confidence: 99%
“…The information flow analysis [23][24][25][26][27][28][29][30][31][32][33][34] is another type of mainstream method whereby malicious behaviors, such as privacy theft, hijacking, and deception, are detected by calculating the reachability of information flow to search for potential leaks and penetration paths. Although this method analyzes the behavior of information flow, the tracking overhead is considerable.…”
Section: Introductionmentioning
confidence: 99%