2020
DOI: 10.1109/access.2020.2987059
|View full text |Cite
|
Sign up to set email alerts
|

Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique

Abstract: With the popularization of smart devices, companies are adopting bring-your-own-device or mobile office policies that utilize personal smart devices for work. However, as work data are stored on individual smart devices, critical security threats are emerging, such as the leakage of confidential documents. Enterprises want to address this issue by adapting enterprise mobility management (EMM) solutions. Appwrapping is among the core technologies in EMM solutions, enabling security function insertion or misused… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…Function-level patching is coarser compared to instruction-level patching as it targets patching whole functions [4,34].…”
Section: Function-level Patchingmentioning
confidence: 99%
See 4 more Smart Citations
“…Function-level patching is coarser compared to instruction-level patching as it targets patching whole functions [4,34].…”
Section: Function-level Patchingmentioning
confidence: 99%
“…For example, it replaces a buggy function with a patched one to eliminate vulnerabilities. A set of studies have proposed to perform function-level patching [4,9,24,25,[33][34][35][36][37]. Performing function-level patching requires taking crossfunction dependencies into consideration.…”
Section: Function-level Patchingmentioning
confidence: 99%
See 3 more Smart Citations