File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

전유석

Jeon, Yuseok
Secure Software Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

DryJIN: Detecting Information Leaks inAndroid Applications

Author(s)
Choi, MinseongIm, YubinKo, SteveKwon, YonghwiJeon, YuseokCho, Haehyun
Issued Date
2024-06-12
DOI
10.1007/978-3-031-65175-5_6
URI
https://scholarworks.unist.ac.kr/handle/201301/83830
Citation
39th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2024, pp.76 - 90
Abstract
Android devices, handling sensitive data like call records and text messages, are prone to privacy breaches. Existing information flow tracking systems face difficulties in detecting these breaches due to two main challenges: the multi-layered Android platform using different programming languages (Java and C/C++), and the complex, event-driven execution flow of Android apps that complicates tracking, especially across these language barriers. Our system, DryJIN, addresses this by effectively tracking information flow within and across both Java and native modules. Utilizing symbolic execution for native code data flows and integrating it with Java data flows, DryJIN enhances existing static analysis techniques (Argus-SAF, JuCify, and FlowDroid) to cover previously unaddressed information flow patterns. We validated DryJIN ’s effectiveness through a comprehensive evaluation on over 168k apps, including malware and real-world apps, demonstrating its superiority over current state-of-the-art methods.
Publisher
Springer Science and Business Media Deutschland GmbH

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.