Constructing features for detecting android malicious applications: issues, taxonomy and directions

W Wang, M Zhao, Z Gao, G Xu, H Xian, Y Li… - IEEE …, 2019 - ieeexplore.ieee.org
The number of applications (apps) available for smart devices or Android based IoT (Internet
of Things) has surged dramatically over the past few years. Meanwhile, the volume of ill …

Execution recording and reconstruction for detecting information flows in android apps

H Inayoshi, S Kakei, S Saito - IEEE Access, 2023 - ieeexplore.ieee.org
Security researchers utilize taint analyses to uncover suspicious behaviors in Android apps.
Current static taint analyzers cannot handle ICC, reflection, and lifecycles dependably …

VTDroid: Value-based tracking for overcoming anti-taint-analysis techniques in Android apps

H Inayoshi, S Kakei, E Takimoto, K Mouri… - Proceedings of the 16th …, 2021 - dl.acm.org
Bytecode-level taint tracking discovers suspicious apps on the Android platform; however,
malicious apps can bypass it by transferring information via system layers in the Android. A …

Plug and analyze: Usable dynamic taint tracker for Android apps

H Inayoshi, S Kakei, S Saito - 2022 IEEE 22nd International …, 2022 - ieeexplore.ieee.org
Taint analyses, especially static taint analyses, are utilized to uncover hidden and
suspicious behaviors in Android apps. However, current static taint analyzers use imprecise …

Value-utilized taint propagation: toward precise detection of apps' information flows across Android API calls

H Inayoshi, S Kakei, E Takimoto, K Mouri… - International Journal of …, 2022 - Springer
Android security researchers utilize taint analysis to uncover apps' bugs and policy-violating
behaviors. However, the investigations are unsafe because current taint trackers can be …

A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing

M Alrammal, M Naveed, S Sallam… - Journal of Internet …, 2022 - jit.ndhu.edu.tw
Android has become the dominant operating system for portable devices, making it a
valuable asset that needs protection. Though Android is very popular; it has several …

Prevention of data leakage due to implicit information flows in android applications

H Inayoshi, S Kakei, E Takimoto… - 2019 14th Asia Joint …, 2019 - ieeexplore.ieee.org
Dynamic Taint Analysis (DTA) technique has been developed for analysis and
understanding behavior of Android applications and privacy policy enforcement. Meanwhile …

[PDF][PDF] Privacy Settings of Third-Party Libraries in Android Apps: A Study of Facebook SDKs

D Rodriguez, JA Calandrino, JM Del Alamo… - Proceedings on Privacy … - usableprivacy.org
Previous studies have demonstrated that privacy issues in mobile apps often stem from the
integration of third-party libraries (TPLs). To shed light on factors that contribute to these …

[PDF][PDF] A Study on Taint Analysis with Runtime Data for Tracking Information Flows in Android Apps

H Inayoshi - 2024 - nitech.repo.nii.ac.jp
Android OS started with version 1.0, released in 2008, and currently has 70% of the mobile
OS market share in 2023 [1]. Android OS became the most popular mobile OS in the world …

Vulnerability Detection Method, Apparatus, Electronic Device and Storage Medium

X Cao, Y Tang, X Li, Y Pei, M Gao - US Patent App. 17/209,553, 2021 - Google Patents
The present application discloses a vulnerability detection method and apparatus, an
electronic device and a storage medium, and relates to the field of vulnerability processing …