Loading...
Please wait, while we are loading the content...
Precise, General, and Efficient Data-flow Analysis for Security Vetting of Android Apps
| Content Provider | Semantic Scholar |
|---|---|
| Author | Wei, Fengguo |
| Copyright Year | 2018 |
| Abstract | vii CHAPTER 1: INTRODUCTION 1 1.1 Android Security Issues and Vetting System 1 1.2 Previous Works on Android Security Analysis 2 1.2.1 Android Static Analysis 2 1.2.2 Dynamic and Hybrid Analysis 5 1.3 Android Static Analysis Challenges 6 1.4 Contributions 7 CHAPTER 2: ANDROID SYSTEM MODEL 10 2.1 Runtime Environment Model 10 2.1.1 Event-based System 10 2.1.2 Component-level Environment Model 12 2.2 System API Model 13 2.2.1 Heap Manipulation Summary Language 14 CHAPTER 3: DATA-FLOW ANALYSIS 16 3.1 Reaching Facts Analysis (RFA) 17 3.1.1 Notations 17 3.1.2 The Basic DFG Building Process 18 3.1.3 Handle Library APIs 22 3.2 Summary-based Bottom-up Data-flow Analysis (SBDA) 22 3.3 Discussion 25 CHAPTER 4: COMPONENT-BASED ANALYSIS 27 4.1 Motivating Example 27 4.2 Building the Component-level Data-flow Graph 30 4.3 Building the Component-level Data Dependence Graph 30 4.4 Linking Inter-component Data Flows 32 4.4.1 Intent 36 4.4.1.1 ST Construction 36 4.4.1.2 Stitching Intent Channels – Intent Destination Resolution 37 4.4.2 RPC 38 4.4.2.1 ST Construction 38 |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=8574&context=etd |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |