DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code

Mohannad Alhanahnah, Qiben Yan*, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-An, Xiapu Luo

*Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    24 Citations (SciVal)
    Original languageEnglish
    Article number9017933
    Pages (from-to)2782-2797
    Number of pages16
    JournalIEEE Transactions on Information Forensics and Security
    Volume15
    DOIs
    Publication statusPublished (VoR) - 2020

    Funding

    Manuscript received July 22, 2019; revised December 7, 2019 and February 4, 2020; accepted February 10, 2020. Date of publication February 28, 2020; date of current version March 24, 2020. This work was supported in part by the National Science Foundation Awards CNS-1950171, CCF-1755890, and CCF-1618132. The work of Xiapu Luo was supported by the Hong Kong RGC Projects (No. 152279/16E, 152223/17E, and CityU C1008-16G). The associate editor coordinating the review of this manuscript and approving it for publication was Prof. Wei Yu. (Corresponding author: Qiben Yan.) Mohannad Alhanahnah, Hamid Bagheri, Yutaka Tsutano, and Witawas Srisa-an are with the Department of Computer Science and Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588 USA.

    Keywords

    • Mobile security
    • dynamically loaded code
    • inter-app communication
    • reflection

    Fingerprint

    Dive into the research topics of 'DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code'. Together they form a unique fingerprint.

    Cite this