2016
DOI: 10.1007/978-3-319-33630-5_23
|View full text |Cite
|
Sign up to set email alerts
|

NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries

Abstract: Part 9: Software SecurityInternational audienceAn increasing number of Android developers are incorporating third-party native libraries in their applications for code reuse, CPU-intensive tasks and other purposes. However current Android security mechanism can not regulate the native code in applications well. Many approaches have been proposed to enforce security of Android applications, but few of them involve security of the native libraries in Android applications.In this paper, we propose NativeProtector… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…SVM is the best performer, as per the results [27]. e Native Protector system, which regulates third-party in Android apps, local libraries are used is proposed [28]. e server app and the client app are the two halves of the standalone Android app.…”
Section: Privacy-preserving Categorization Of Mobile Applicationsmentioning
confidence: 99%
“…SVM is the best performer, as per the results [27]. e Native Protector system, which regulates third-party in Android apps, local libraries are used is proposed [28]. e server app and the client app are the two halves of the standalone Android app.…”
Section: Privacy-preserving Categorization Of Mobile Applicationsmentioning
confidence: 99%
“…It uses Google's Native Client program in a separated thread to redirect specific calls for loading the modules which host the native code. NativeProtector [41] follows the processbased isolations of NativeGuard, and intercepts sensitive native calls to perform fine-grained access control.…”
Section: Related Workmentioning
confidence: 99%
“…A class of security solutions that has attracted researchers over the last twenty years consists of enabling software applications to become immune against attacks [1][2][3][4]. This is a challenging area as it integrates several domains including anomaly-based intrusion detection and prevention [5][6][7][8][9][10][11], application partitioning and sandboxing [12][13][14][15], automatic error detection and patching [3,4], as well as collaborative application communities [1,16,17]. To this end, not only can these fields be leveraged and combined in different ways, but they can also be approached from different perspectives and using different techniques.…”
Section: Introductionmentioning
confidence: 99%