2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2015
DOI: 10.1109/icse.2015.48
|View full text |Cite
|
Sign up to set email alerts
|

IccTA: Detecting Inter-Component Privacy Leaks in Android Apps

Abstract: Abstract-Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Play. At installation, this application is given permission to (1) access the Internet (for updating wallpapers) and (2) use the device microphone (to change background following noise changes). With these permissions, the application could silently record user conversations and upload them remotely. To give more confidence about how Shake Them All actually processes what it records, it is necessary to build … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
369
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 405 publications
(373 citation statements)
references
References 30 publications
3
369
0
1
Order By: Relevance
“…We consider IccTA [16], a state-of-the-art Android intra-app analysis tool, which originally aims at detecting inter-component privacy leaks inside a single Android app. We select IccTA to validate our approach by investigating the effectiveness of ApkCombiner in supporting existing tools for performing inter-app analyses.…”
Section: Inter-app Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…We consider IccTA [16], a state-of-the-art Android intra-app analysis tool, which originally aims at detecting inter-component privacy leaks inside a single Android app. We select IccTA to validate our approach by investigating the effectiveness of ApkCombiner in supporting existing tools for performing inter-app analyses.…”
Section: Inter-app Analysismentioning
confidence: 99%
“…In the second step, we evaluate ApkCombiner on 3,000 real Android apps. We first build an IAC graph through the results of our extended Epicc [16,18], where an app stands for a node and an inter-app communication is modeled as an edge. For each of such edges, we launched ApkCombiner on the associated pair of apps and then used IccTA on the generated app.…”
Section: Inter-app Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…[29]. Flowdroid [7] and IccTA [17] used the lifecycle of components for inter-callback analysis. The manual models can only handle a subset of the callbacks executed in the Android API methods, and can be imprecise [25] and difficult to update as the Android framework evolves.…”
Section: Discussionmentioning
confidence: 99%
“…Unfortunately, the mobile devices also attract more attacks and the safety of these privacy data has received lots of concerns [11,8,13,12,14]. To steal the user privacy persistently, one of the common methods for the attackers is to obtain the elevated privilege of the user devices and inject the eavesdropping modules.…”
Section: "'%#('#"mentioning
confidence: 99%