惊惶 发表于 2025-3-28 16:31:16
Using Provenance Patterns to Vet Sensitive Behaviors in Android Appsrmation. Dagger identifies behaviors by matching the provenance graph with the behavior graph patterns that are previously extracted from the internal working logic of the Android framework. We evaluate Dagger on both a set of over 1200 known malicious Android apps, and a second set of 1000 apps ranInfinitesimal 发表于 2025-3-28 20:40:18
SplitDroid: Isolated Execution of Sensitive Components for Mobile Applicationsen the isolated component and normal Android apps, such that non-privacy-related information can be interchanged to ensure its correct execution. Finally, we demonstrate the feasibility and effectiveness of SplitDroid through a case study.绝食 发表于 2025-3-29 02:31:32
Kernel Data Attack Is a Realistic Security Threatckers can steal sensitive information. Therefore, existing defense mechanisms including those deployed at hypervisor level that search for hidden processes/hidden modules, or monitor kernel code integrity, will not be able to detect DLOGGER. To counter against kernel data attack, by classifying kernmitral-valve 发表于 2025-3-29 06:45:56
http://reply.papertrans.cn/87/8636/863501/863501_44.pngExpostulate 发表于 2025-3-29 07:17:44
SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Servicen both the kernel and user spaces. It not only allows flexible interactions between a PAL and untrusted environments, but also improved the utilization of resources, without compromising the security of the PAL. We have implemented SuperCall on top of a tiny hypervisor. To demonstrate and evaluate Santecedence 发表于 2025-3-29 11:32:07
http://reply.papertrans.cn/87/8636/863501/863501_46.pngTOM 发表于 2025-3-29 19:08:01
Uranine: Real-time Privacy Leakage Monitoring without System Modification for Androidnformation flow across framework code, handling callback functions, and expressing all information-flow tracking at the bytecode level. Our evaluation of Uranine shows that it is accurate at detecting privacy leaks and has acceptable performance overhead.CALL 发表于 2025-3-29 23:33:42
http://reply.papertrans.cn/87/8636/863501/863501_48.pngcolony 发表于 2025-3-30 03:57:11
http://reply.papertrans.cn/87/8636/863501/863501_49.pngwreathe 发表于 2025-3-30 06:46:17
http://reply.papertrans.cn/87/8636/863501/863501_50.png