File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

전유석

Jeon, Yuseok
Secure Software Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.conferencePlace UK -
dc.citation.endPage 90 -
dc.citation.startPage 76 -
dc.citation.title 39th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2024 -
dc.contributor.author Choi, Minseong -
dc.contributor.author Im, Yubin -
dc.contributor.author Ko, Steve -
dc.contributor.author Kwon, Yonghwi -
dc.contributor.author Jeon, Yuseok -
dc.contributor.author Cho, Haehyun -
dc.date.accessioned 2024-09-19T16:35:12Z -
dc.date.available 2024-09-19T16:35:12Z -
dc.date.created 2024-09-15 -
dc.date.issued 2024-06-12 -
dc.description.abstract Android devices, handling sensitive data like call records and text messages, are prone to privacy breaches. Existing information flow tracking systems face difficulties in detecting these breaches due to two main challenges: the multi-layered Android platform using different programming languages (Java and C/C++), and the complex, event-driven execution flow of Android apps that complicates tracking, especially across these language barriers. Our system, DryJIN, addresses this by effectively tracking information flow within and across both Java and native modules. Utilizing symbolic execution for native code data flows and integrating it with Java data flows, DryJIN enhances existing static analysis techniques (Argus-SAF, JuCify, and FlowDroid) to cover previously unaddressed information flow patterns. We validated DryJIN ’s effectiveness through a comprehensive evaluation on over 168k apps, including malware and real-world apps, demonstrating its superiority over current state-of-the-art methods. -
dc.identifier.bibliographicCitation 39th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2024, pp.76 - 90 -
dc.identifier.doi 10.1007/978-3-031-65175-5_6 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/83830 -
dc.language 영어 -
dc.publisher Springer Science and Business Media Deutschland GmbH -
dc.title DryJIN: Detecting Information Leaks inAndroid Applications -
dc.type Conference Paper -
dc.date.conferenceDate 2024-06-12 -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.