The role of the adversary model in applied security research
Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …
schemes or protocols. However, their use in other computer science research disciplines is …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
[PDF][PDF] FLEXDROID: Enforcing In-App Privilege Separation in Android.
Mobile applications are increasingly integrating third-party libraries to provide various
features, such as advertising, analytics, social networking, and more. Unfortunately, such …
features, such as advertising, analytics, social networking, and more. Unfortunately, such …
[PDF][PDF] SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.
Previous research on kernel monitoring and protection widely relies on higher privileged
system components, such as hardware virtualization extensions, to isolate security tools …
system components, such as hardware virtualization extensions, to isolate security tools …
[PDF][PDF] Artdroid: A virtual-method hooking framework on android art runtime.
V Costamagna, C Zheng - IMPS@ ESSoS, 2016 - academia.edu
Various static and dynamic analysis techniques are developed to detect and analyze
Android malware. Some advanced Android malware can use Java reflection and JNI …
Android malware. Some advanced Android malware can use Java reflection and JNI …
NDroid: Toward tracking information flows across multiple Android contexts
For performance and compatibility reasons, developers tend to use native code in their
applications (or simply apps). This makes a bidirectional data flow through multiple contexts …
applications (or simply apps). This makes a bidirectional data flow through multiple contexts …
The art of app compartmentalization: Compiler-based library privilege separation on stock android
Third-party libraries are commonly used by app developers for alleviating the development
efforts and for monetizing their apps. On Android, the host app and its third-party libraries …
efforts and for monetizing their apps. On Android, the host app and its third-party libraries …
Harvesting developer credentials in android apps
Developers often integrate third-party services into their apps. To access a service, an app
must authenticate itself to the service with a credential. However, credentials in apps are …
must authenticate itself to the service with a credential. However, credentials in apps are …
Blender: Self-randomizing address space layout for android apps
In this paper, we first demonstrate that the newly introduced Android RunTime (ART) in latest
Android versions (Android 5.0 or above) exposes a new attack surface, namely, the “return …
Android versions (Android 5.0 or above) exposes a new attack surface, namely, the “return …
Rethinking permission enforcement mechanism on mobile systems
To protect sensitive resources from unauthorized use, modern mobile systems, such as
Android and iOS, design a permission-based access control model. However, current model …
Android and iOS, design a permission-based access control model. However, current model …