2020
DOI: 10.3390/info11030130
|View full text |Cite
|
Sign up to set email alerts
|

Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications

Abstract: Today, Android accounts for more than 80% of the global market share. Such a high rate makes Android applications an important topic that raises serious questions about its security, privacy, misbehavior and correctness. Application code analysis is obviously the most appropriate and natural means to address these issues. However, no analysis could be led with confidence in the absence of a solid formal foundation. In this paper, we propose a full-fledged formal approach to build the operational semantics of a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 25 publications
0
1
0
1
Order By: Relevance
“…Reverse engineering menyediakan kode sumber aplikasi, pandangan wawasan terhadap arsitektur, dan ketergantungan pihak ketiga (Asher et al, 2021). Reverse engineering dalam perangkat lunak memungkinkan untuk mengubah file biner yang dapat dibaca oleh mesin menjadi file yang dapat dibaca oleh manusia, seperti yang terjadi pada file DEX (Ziadia et al, 2020). Melakukan reverse engineering pada aplikasi Android dan mengekstrak fitur serta melakukan analisis statis dari mereka tanpa harus menjalankannya (Singh, 2022).…”
Section: Pendahuluanunclassified
“…Reverse engineering menyediakan kode sumber aplikasi, pandangan wawasan terhadap arsitektur, dan ketergantungan pihak ketiga (Asher et al, 2021). Reverse engineering dalam perangkat lunak memungkinkan untuk mengubah file biner yang dapat dibaca oleh mesin menjadi file yang dapat dibaca oleh manusia, seperti yang terjadi pada file DEX (Ziadia et al, 2020). Melakukan reverse engineering pada aplikasi Android dan mengekstrak fitur serta melakukan analisis statis dari mereka tanpa harus menjalankannya (Singh, 2022).…”
Section: Pendahuluanunclassified
“…Furthermore, the classes in Java format can be restored from the .dex file by deploying Dex2jar tool [13]. This reverse engineering step might be necessary for some research works to implement deep feature extraction [14]- [16].…”
Section: Background and Literature Review A Android Application Packagementioning
confidence: 99%