메뉴 건너뛰기




Volumn 49, Issue 6, 2014, Pages 259-269

FLOWDROID: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps

Author keywords

[No Author keywords available]

Indexed keywords

ACCIDENTS; COMPUTER VIRUSES; ERRORS; LIFE CYCLE; SECURITY OF DATA; SMARTPHONES;

EID: 84907029013     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: 10.1145/2594291.2594299     Document Type: Conference Paper
Times cited : (1018)

References (42)
  • 1
    • 84901602864 scopus 로고    scopus 로고
    • aug
    • Virus share, aug 2013. http://virusshare.com/.
    • (2013) Virus Share
  • 2
    • 84901587713 scopus 로고    scopus 로고
    • Apr
    • IBM Rational AppScan, Apr. 2013. http://www-01.ibm.com/software/de/rational/appscan/.
    • (2013) IBM Rational AppScan
  • 3
    • 84901625779 scopus 로고    scopus 로고
    • Apr
    • Fortify 360 Source Code Analyzer (SCA), Apr. 2013. http://www8.hp.com/us/en/software-solutions/software.html?compURI=1214365#.UW6CVKuAtfQ.
    • (2013) Fortify 360 Source Code Analyzer (SCA
  • 4
    • 84866946869 scopus 로고    scopus 로고
    • Automatically securing permission-based software by reducing the attack surface: An application to android
    • A. Bartel, J. Klein, Y. Le Traon, and M. Monperrus. Automatically securing permission-based software by reducing the attack surface: an application to android. In ASE 2012, pages 274-277, 2012.
    • (2012) ASE 2012 , pp. 274-277
    • Bartel, A.1    Klein, J.2    Le Traon, Y.3    Monperrus, M.4
  • 11
    • 85076889619 scopus 로고    scopus 로고
    • Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • USENIX Association, R. H. Arpaci-Dusseau and B. Chen, editors
    • W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In R. H. Arpaci-Dusseau and B. Chen, editors, OSDI, pages 393-407. USENIX Association, 2010.
    • (2010) OSDI , pp. 393-407
    • Enck, W.1    Gilbert, P.2    Gon Chun, B.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6    Sheth, A.7
  • 17
  • 18
    • 84874425349 scopus 로고    scopus 로고
    • Efficient and effective handling of exceptions in java points-to analysis
    • R. Jhala and K. D. Bosschere, editors volume 7791 of Lecture Notes in Computer Science, Springer
    • G. Kastrinis and Y. Smaragdakis. Efficient and effective handling of exceptions in java points-to analysis. In R. Jhala and K. D. Bosschere, editors, CC, volume 7791 of Lecture Notes in Computer Science, pages 41-60. Springer, 2013.
    • (2013) CC , pp. 41-60
    • Kastrinis, G.1    Smaragdakis, Y.2
  • 19
    • 84920514359 scopus 로고    scopus 로고
    • ScanDal: Static analyzer for detecting privacy leaks in android applications
    • IEEE, H. Chen, L. Koved, and D. S. Wallach, editors Los Alamitos, CA, USA, May 2012
    • J. Kim, Y. Yoon, K. Yi, and J. Shin. ScanDal: Static analyzer for detecting privacy leaks in android applications. In H. Chen, L. Koved, and D. S. Wallach, editors, MoST 2012: Mobile Security Technologies 2012, Los Alamitos, CA, USA, May 2012. IEEE.
    • MoST 2012: Mobile Security Technologies 2012
    • Kim, J.1    Yoon, Y.2    Yi, K.3    Shin, J.4
  • 22
    • 35248842644 scopus 로고    scopus 로고
    • Scaling java points-to analysis using spark
    • G. Hedin, editor volume 2622 of LNCS, Springer Berlin Heidelberg
    • O. Lhoták and L. Hendren. Scaling java points-to analysis using spark. In G. Hedin, editor, Compiler Construction, volume 2622 of LNCS, pages 153-169. Springer Berlin Heidelberg, 2003. .
    • (2003) Compiler Construction , pp. 153-169
    • Lhoták, O.1    Hendren, L.2
  • 23
    • 84901633749 scopus 로고    scopus 로고
    • Mar
    • B. Livshits. Securibench micro, Mar. 2013. http://suif.stanford.edu/~livshits/work/securibench-micro/.
    • (2013) Securibench Micro
    • Livshits, B.1
  • 24
    • 84869416020 scopus 로고    scopus 로고
    • Chex: Statically vetting android apps for component hijacking vulnerabilities
    • L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. Chex: statically vetting android apps for component hijacking vulnerabilities. In CCS 2012, pages 229-240, 2012.
    • (2012) CCS 2012 , pp. 229-240
    • Lu, L.1    Li, Z.2    Wu, Z.3    Lee, W.4    Jiang, G.5
  • 28
    • 84901633750 scopus 로고    scopus 로고
    • Paladion. Insecurebank test app. http://www.paladion.net/downloadapp.html.
    • Insecurebank Test App
  • 30
    • 85179847964 scopus 로고    scopus 로고
    • A machine-learning approach for classifying and categorizing android sources and sinks
    • Feb
    • S. Rasthofer, S. Arzt, and E. Bodden. A machine-learning approach for classifying and categorizing android sources and sinks. In 2014 Network and Distributed System Security Symposium (NDSS), Feb. 2014. URL http://www.bodden.de/pubs/rab14classifying.pdf. To appear.
    • (2014) 2014 Network and Distributed System Security Symposium (NDSS)
    • Rasthofer, S.1    Arzt, S.2    Bodden, E.3
  • 31
    • 84924380709 scopus 로고    scopus 로고
    • A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors
    • April
    • A. Reina, A. Fattori, and L. Cavallaro. A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors. In EUROSEC, Prague, Czech Republic, April 2013.
    • (2013) EUROSEC, Prague, Czech Republic
    • Reina, A.1    Fattori, A.2    Cavallaro, L.3
  • 32
    • 0029180939 scopus 로고
    • Precise interprocedural dataflow analysis via graph reachability
    • T. Reps, S. Horwitz, and M. Sagiv. Precise interprocedural dataflow analysis via graph reachability. In POPL '95, pages 49-61, 1995.
    • (1995) POPL ' 95 , pp. 49-61
    • Reps, T.1    Horwitz, S.2    Sagiv, M.3
  • 33
    • 47249122251 scopus 로고    scopus 로고
    • Ide dataflow analysis in the presence of large object-oriented libraries
    • volume 4959 of LNCS, Springer
    • A. Rountev, M. Sharp, and G. Xu. Ide dataflow analysis in the presence of large object-oriented libraries. In Compiler Construction, volume 4959 of LNCS, pages 53-68. Springer, 2008.
    • (2008) Compiler Construction , pp. 53-68
    • Rountev, A.1    Sharp, M.2    Xu, G.3
  • 34
    • 0030263395 scopus 로고    scopus 로고
    • Precise interprocedural dataflow analysis with applications to constant propagation
    • M. Sagiv, T. Reps, and S. Horwitz. Precise interprocedural dataflow analysis with applications to constant propagation. In TAPSOFT '95, pages 131-170, 1996.
    • (1996) TAPSOFT ' 95 , pp. 131-170
    • Sagiv, M.1    Reps, T.2    Horwitz, S.3
  • 37
    • 84874382751 scopus 로고    scopus 로고
    • Andromeda: Accurate and scalable security analysis of web applications
    • O. Tripp, M. Pistoia, P. Cousot, R. Cousot, and S. Guarnieri. Andromeda: Accurate and scalable security analysis of web applications. In FASE 2013, pages 210-225, 2013.
    • (2013) FASE 2013 , pp. 210-225
    • Tripp, O.1    Pistoia, M.2    Cousot, P.3    Cousot, R.4    Guarnieri, S.5
  • 38
    • 85047887956 scopus 로고    scopus 로고
    • Aurasium: Practical policy enforcement for android applications
    • USENIX Association, Berkeley, CA, USA
    • R. Xu, H. Saïdi, and R. Anderson. Aurasium: practical policy enforcement for android applications. In USENIX Security 2012, Security'12, pages 27-27, Berkeley, CA, USA, 2012. USENIX Association.
    • (2012) USENIX Security 2012, Security'12 , pp. 27-27
    • Xu, R.1    Saïdi, H.2    Anderson, R.3
  • 39
    • 85060493868 scopus 로고    scopus 로고
    • Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
    • USENIX Association, Berkeley, CA, USA
    • L. K. Yan and H. Yin. Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In USENIX Security 2012, Security'12, pages 29-29, Berkeley, CA, USA, 2012. USENIX Association.
    • (2012) USENIX Security 2012, Security'12 , pp. 29-29
    • Yan, L.K.1    Yin, H.2
  • 40
    • 84873675066 scopus 로고    scopus 로고
    • Leakminer: Detect information leakage on android with static taint analysis
    • Z. Yang and M. Yang. Leakminer: Detect information leakage on android with static taint analysis. In Software Engineering (WCSE), 2012 Third World Congress on, pages 101-104, 2012.
    • (2012) Software Engineering (WCSE 2012 Third World Congress on , pp. 101-104
    • Yang, Z.1    Yang, M.2
  • 41
    • 84874579631 scopus 로고    scopus 로고
    • Trustdroid: Preventing the use of smartphones for information leaking in corporate networks through the used of static analysis taint tracking
    • Z. Zhao and F. Osono. Trustdroid: Preventing the use of smartphones for information leaking in corporate networks through the used of static analysis taint tracking. In Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on, pages 135-143, 2012.
    • (2012) Malicious and Unwanted Software (MALWARE) 2012 7th International Conference on , pp. 135-143
    • Zhao, Z.1    Osono, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.