PPT-Android Taint Flow Analysis for

Author : mitsue-stanley | Published Date : 2018-11-07

App Sets Will Klieber Lori Flynn Amar Bhosale Limin Jia and Lujo Bauer Carnegie Mellon University presenting Motivation Detect malicious apps that leak sensitive

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Android Taint Flow Analysis for" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Android Taint Flow Analysis for: Transcript


App Sets Will Klieber Lori Flynn Amar Bhosale Limin Jia and Lujo Bauer Carnegie Mellon University presenting Motivation Detect malicious apps that leak sensitive data. Paper by: James Newsome and Dawn Song. Network and Distributed Systems Security Symposium (NDSS), Feb 2005.. . CS451 Spring 2011. Instructor: Christos Papadopoulos. Original slides by . Devendra. . Permission. -Based Security Models and its Application to Android. Outline. Introduction. Related Work. Android Permission . Model. Dataset. Self-Organizing Maps (SOM. ). Component Plane . Analysis. Conclusion & Discussion. About Dynamic . Taint . Analysis & Forward . Symbolic . Execution (. but might have been afraid to ask. ). Edward J. Schwartz, . ThanassisAvgerinos. , David . Brumley. Presented by: . Vaibhav . Rastogi. (but might have been afraid to ask). IEEE S&P 2010. Overview. Two Main Contributions. Precisely describe the algorithms for dynamic taint analysis and forward symbolic execution as extensions to the run-time semantics of a general language. Yinzhi Cao. Reference: . http. ://www.cs.tau.ac.il/~. omertrip/pldi09/TAJ.ppt. www.cs.cmu.edu/~. soonhok/talks/20110301.pdf. 2. Motivating Example. *. * Inspired by . Refl1. in. SecuriBench Micro. Taint Flow #1. Edward J. Schwartz, . Thanassis. Avgerinos, David . Brumley. Presented by: . Haitao Xu. 1. The Root of All Evil. Humans write programs. This Talk:. Computers Analyzing Programs Dynamically at Runtime. Flow . of Sensitive Information . in . Sets of Android Apps. Will . Klieber*, Lori Flynn*, . Amar Bhosale, Limin Jia, and Lujo . Bauer. *presenting. June 2015. Copyright 2015 Carnegie Mellon University. Yinzhi Cao. Reference: . http. ://www.cs.tau.ac.il/~. omertrip/pldi09/TAJ.ppt. www.cs.cmu.edu/~. soonhok/talks/20110301.pdf. 2. Motivating Example. *. * Inspired by . Refl1. in. SecuriBench Micro. Taint Flow #1. About Dynamic . Taint . Analysis & Forward . Symbolic . Execution (. but might have been afraid to ask. ). Edward J. Schwartz, . ThanassisAvgerinos. , David . Brumley. Presented by: . Vaibhav . Rastogi. Course: . E6998 . Date: . December 1, 2014. Instructor: . Professor Alfred Aho. Static Analysis Techniques used in Android . application Security . Analysis. Presentation Outline. December 1, 2014. E6998 Professor Aho Student Schmeelk. Yongjian Hu Two Sigma Investments. Oriana Riva Microsoft Research. Suman Nath Microsoft Research. Iulian Neamtiu. New Jersey Institute of Technology. m.yelp.com. /biz/. sushi-. yasaka. -new-. york. Realtime. Privacy. Monitoring On Smartphones. Authors:. William . Enck. The . Pennsylvania State . University . Peter Gilbert Duke University . Byung-Gon. Chun Intel Labs . Landon . P. . Cox Duke University . Fenghao. Xu, . Siyu. Shen, . Wenrui. . Diao. , Zhou Li , Yi Chen , Rui Li, . Kehuan. Zhang. The Chinese University of Hong Kong, Shandong University, University of California, Irvine. 2021 ACM SIGSAC Conference on Computer and Communications Security. Lucky ONWUZURIKE. November 15, 2018. Motivation. 2. Why Apps?. They often handle and transmit sensitive information. Some have been shown to contain vulnerabilities (e.g., accepting invalid TLS certificate, permission abuse etc.).

Download Document

Here is the link to download the presentation.
"Android Taint Flow Analysis for"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents