Presentation 2014-06-06
Analyzing Dynamic Class Loaded Applications in Android
Takaaki NAGUMO, Mitsuaki AKIYAMA, Takeshi YAGI, Takeo HARIU,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Sensitive information leakage that trespasses on the privacy policy in smartphones has become one of the most serious threats. In particular, Android applications using dynamic class loader scheme can evade pre-analysis. To tackle this problem, this paper proposes a new method for analyzing Android applications based on our technology. The experimental results of real Android applications demonstrate the effectiveness of our method.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Android / Dynamic Class Loader / Sensitive Data Sent / Dynamic Analysis
Paper # IA2014-8,ICSS2014-8
Date of Issue

Conference Information
Committee IA
Conference Date 2014/5/29(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Internet Architecture(IA)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Analyzing Dynamic Class Loaded Applications in Android
Sub Title (in English)
Keyword(1) Android
Keyword(2) Dynamic Class Loader
Keyword(3) Sensitive Data Sent
Keyword(4) Dynamic Analysis
1st Author's Name Takaaki NAGUMO
1st Author's Affiliation NTT Secure Platform Laboratories()
2nd Author's Name Mitsuaki AKIYAMA
2nd Author's Affiliation NTT Secure Platform Laboratories
3rd Author's Name Takeshi YAGI
3rd Author's Affiliation NTT Secure Platform Laboratories
4th Author's Name Takeo HARIU
4th Author's Affiliation NTT Secure Platform Laboratories
Date 2014-06-06
Paper # IA2014-8,ICSS2014-8
Volume (vol) vol.114
Number (no) 70
Page pp.pp.-
#Pages 6
Date of Issue