Tracking explicit and control flows in Java and native Android apps code, - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Communication Dans Un Congrès Année : 2016

Tracking explicit and control flows in Java and native Android apps code,

Résumé

The native app development is increased in Android systems to implement CPU-intensive applications such as game engines, signal processing, and physics simulation. However, native code analysis is very difficult and requires a lot of time which explains the limited number of systems that track information flow in native libraries. But, none of them detects the sensitive information leakage through control flows at native level. In this paper, we combine dynamic and static taint analysis to propagate taint along control dependencies. Our approach has proven to be effective in analyzing several malicious Android applications that invoke native librairies with reasonable performance overheads.

Dates et versions

hal-01385196 , version 1 (21-10-2016)

Identifiants

Citer

Mariem Graa, Frédéric Cuppens, Nora Cuppens-Boulahia, Jean-Louis Lanet. Tracking explicit and control flows in Java and native Android apps code,. ICISSP 2016 : 2nd International Conference on Information Systems Security and Privacy,, Feb 2016, Roma, Italy. ⟨10.5220/0005686603070316⟩. ⟨hal-01385196⟩
381 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More