Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/482
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGajrani J.en_US
dc.contributor.authorAgarwal U.en_US
dc.contributor.authorLaxmi V.en_US
dc.contributor.authorBezawada B.en_US
dc.contributor.authorGaur M.S.en_US
dc.contributor.authorTripathi M.en_US
dc.contributor.authorZemmari A.en_US
dc.date.accessioned2023-11-30T08:35:34Z-
dc.date.available2023-11-30T08:35:34Z-
dc.date.issued2020-
dc.identifier.issn0167-4048-
dc.identifier.otherEID(2-s2.0-85077153108)-
dc.identifier.urihttps://dx.doi.org/10.1016/j.cose.2019.101688-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/482-
dc.description.abstractMalicious smartphone apps use reflection APIs to exfiltrate user data and steal personal information. These malware use reflection along with parameter obfuscation and encryption to evade detection by static analysis. Dynamic analysis is a possible approach to detect such run-time malicious behavior. However, dynamic analysis of a software, usually, results in the exploration of a large, potentially exponential, number of program branches. Many of these program paths are not useful to analyze the reflection APIs, and significantly affect the efficiency of the dynamic analysis. In this paper, we propose a hybrid analysis approach named EspyDroid+1 that overcomes the drawbacks of static analysis in analyzing the obfuscated and run-time dependent parameters of reflection APIs. EspyDroid+ incorporates Reflection Guided Static Slicing (RGSS), an efficient approach to deal with exploration of large number of program paths by pruning irrelevant program paths and ensures that the resultant paths get executed during the subsequent dynamic analysis. We observed that EspyDroid+ successfully removed 59.91% of the total paths on a test dataset consisting of 660 apps without any loss of semantics. We conclude that EspyDroid+ is effective, fast, and scalable in uncovering reflection API induced privacy leaks. © 2019en_US
dc.language.isoenen_US
dc.publisherElsevier Ltden_US
dc.sourceComputers and Securityen_US
dc.subjectAndroiden_US
dc.subjectDynamicen_US
dc.subjectInstrumentationen_US
dc.subjectMalwareen_US
dc.subjectPrivacy leaksen_US
dc.subjectReflectionen_US
dc.subjectRun-timeen_US
dc.subjectStaticen_US
dc.titleEspyDroid+: Precise reflection analysis of android appsen_US
dc.typeJournal Articleen_US
Appears in Collections:Journal Article

Files in This Item:
There are no files associated with this item.
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.