Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code

Mohannad Alhanahnah, Qiben Yan, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-An, Xiapu Luo

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Citations (SciVal)
    Original languageEnglish
    Title of host publicationINFOCOM 2019 - IEEE Conference on Computer Communications
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages550-558
    Number of pages9
    ISBN (Electronic)9781728105154
    DOIs
    Publication statusPublished (VoR) - Apr 2019
    Event2019 IEEE Conference on Computer Communications, INFOCOM 2019 - Paris, France
    Duration: 29 Apr 20192 May 2019

    Publication series

    NameProceedings - IEEE INFOCOM
    Volume2019-April
    ISSN (Print)0743-166X

    Conference

    Conference2019 IEEE Conference on Computer Communications, INFOCOM 2019
    Country/TerritoryFrance
    CityParis
    Period29/04/192/05/19

    Funding

    ACKNOWLEDGEMENTS We would like to thank the anonymous reviewers for their valuable comments and feedback. This work was supported in part by an NSF EPSCoR FIRST award, and the NSF grants CNS-1566388, CNS-1717898, CCF-1755890 and CCF-1618132. This work was also supported in part by RGC Project No. PolyU 152279/16E, CityU C1008-16G. REFERENCES This work was supported in part by an NSF EPSCoR FIRST award, and the NSF grants CNS-1566388, CNS-1717898, CCF-1755890 and CCF-1618132. This work was also supported in part by RGC Project No. PolyU 152279/16E, CityU C1008-16G.

    Keywords

    • Mobile security
    • dynamically loaded code
    • inter-app communication
    • reflection

    Fingerprint

    Dive into the research topics of 'Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code'. Together they form a unique fingerprint.

    Cite this