The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

[PDF][PDF] FLEXDROID: Enforcing In-App Privilege Separation in Android.

J Seo, D Kim, D Cho, I Shin, T Kim - NDSS, 2016 - gts3.org
Mobile applications are increasingly integrating third-party libraries to provide various
features, such as advertising, analytics, social networking, and more. Unfortunately, such …

[PDF][PDF] SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.

AM Azab, K Swidowski, R Bhutkar, J Ma, W Shen… - NDSS, 2016 - internetsociety.org
Previous research on kernel monitoring and protection widely relies on higher privileged
system components, such as hardware virtualization extensions, to isolate security tools …

[PDF][PDF] Artdroid: A virtual-method hooking framework on android art runtime.

V Costamagna, C Zheng - IMPS@ ESSoS, 2016 - academia.edu
Various static and dynamic analysis techniques are developed to detect and analyze
Android malware. Some advanced Android malware can use Java reflection and JNI …

NDroid: Toward tracking information flows across multiple Android contexts

L Xue, C Qian, H Zhou, X Luo, Y Zhou… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
For performance and compatibility reasons, developers tend to use native code in their
applications (or simply apps). This makes a bidirectional data flow through multiple contexts …

The art of app compartmentalization: Compiler-based library privilege separation on stock android

J Huang, O Schranz, S Bugiel, M Backes - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
Third-party libraries are commonly used by app developers for alleviating the development
efforts and for monetizing their apps. On Android, the host app and its third-party libraries …

Harvesting developer credentials in android apps

Y Zhou, L Wu, Z Wang, X Jiang - … of the 8th ACM conference on security …, 2015 - dl.acm.org
Developers often integrate third-party services into their apps. To access a service, an app
must authenticate itself to the service with a credential. However, credentials in apps are …

Blender: Self-randomizing address space layout for android apps

M Sun, JCS Lui, Y Zhou - Research in Attacks, Intrusions, and Defenses …, 2016 - Springer
In this paper, we first demonstrate that the newly introduced Android RunTime (ART) in latest
Android versions (Android 5.0 or above) exposes a new attack surface, namely, the “return …

Rethinking permission enforcement mechanism on mobile systems

Y Zhang, M Yang, G Gu, H Chen - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
To protect sensitive resources from unauthorized use, modern mobile systems, such as
Android and iOS, design a permission-based access control model. However, current model …