H Lu, Y Liu, X Liao, L Xing - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
Integration of third-party SDKs are essential in the development of mobile apps. However, the rise of in-app privacy threat against mobile SDKs—called cross-library data harvesting …
Android has become the most widely used mobile operating system (OS) in recent years. There is much research on methods for detecting malicious Android applications. Dynamic …
Information flows in Android can be effectively used to give an informative summary of an application's behavior, showing how and for what purpose apps use specific pieces of …
B Buddhadev, P Faruki, MS Gaur… - IETE Journal of …, 2022 - Taylor & Francis
Smartphones are enriched by applications (apps) available through the mobile ecosystem. Various studies have reported that apps leaking sensitive user and device information are …
Y Ren, W Dong, J Lin, X Miao - IEEE Access, 2019 - ieeexplore.ieee.org
With the development of the Internet of Things, the security of embedded device has received extensive attention. Taint analysis technology can improve the understanding of …
We present LATCH (short for Locality-Aware Taint CHecker), a generalizable architecture for optimizing dynamic information flow tracking (DIFT). LATCH exploits the observation that …
E Ogawa, T Yamazaki, R Shioya - Proceedings of the 21st ACM …, 2024 - dl.acm.org
Dynamic Taint Analysis (DTA) is a widely studied technique that can effectively detect various attacks and information leakage. In the context of detecting information leakage, taint …