TY - GEN
T1 - Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code
AU - Alhanahnah, Mohannad
AU - Yan, Qiben
AU - Bagheri, Hamid
AU - Zhou, Hao
AU - Tsutano, Yutaka
AU - Srisa-An, Witawas
AU - Luo, Xiapu
N1 - Funding Information:
ACKNOWLEDGEMENTS We would like to thank the anonymous reviewers for their valuable comments and feedback. This work was supported in part by an NSF EPSCoR FIRST award, and the NSF grants CNS-1566388, CNS-1717898, CCF-1755890 and CCF-1618132. This work was also supported in part by RGC Project No. PolyU 152279/16E, CityU C1008-16G. REFERENCES
Funding Information:
This work was supported in part by an NSF EPSCoR FIRST award, and the NSF grants CNS-1566388, CNS-1717898, CCF-1755890 and CCF-1618132. This work was also supported in part by RGC Project No. PolyU 152279/16E, CityU C1008-16G.
Publisher Copyright:
© 2019 IEEE.
PY - 2019/4
Y1 - 2019/4
KW - Mobile security
KW - dynamically loaded code
KW - inter-app communication
KW - reflection
UR - http://www.scopus.com/inward/record.url?scp=85068220924&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85068220924&partnerID=8YFLogxK
U2 - 10.1109/INFOCOM.2019.8737637
DO - 10.1109/INFOCOM.2019.8737637
M3 - Conference contribution
AN - SCOPUS:85068220924
T3 - Proceedings - IEEE INFOCOM
SP - 550
EP - 558
BT - INFOCOM 2019 - IEEE Conference on Computer Communications
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2019 IEEE Conference on Computer Communications, INFOCOM 2019
Y2 - 29 April 2019 through 2 May 2019
ER -