Now showing items 1-5 of 5

    • Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution 

      Micinski, Kristopher; Fetter-Degges, Jonathan; Jeon, Jinseong; Foster, Jeffrey S.; Clarkson, Michael R. (2015-07-01)
      Mobile apps can access a wide variety of secure information, such as contacts and location. However, current mobile platforms include only coarse access control mechanisms to protect such data. In this paper, we introduce ...
    • Dr. Android and Mr. Hide: Fine-grained security policies on unmodified Android 

      Jeon, Jinseong; Micinski, Kristopher K.; Vaughan, Jeffrey A.; Reddy, Nikhilesh; Zhu, Yixin; Foster, Jeffrey S.; Millstein, Todd (2011-12-09)
      Google’s Android platform includes a permission model that protects access to sensitive capabilities, such as Internet access, GPS use, and telephony. We have found that Android’s current permissions are often overly ...
    • FRAMEWORK SYNTHESIS FOR SYMBOLIC EXECUTION OF EVENT-DRIVEN FRAMEWORKS 

      Jeon, Jinseong (2016)
      Symbolic execution is a powerful program analysis technique, but it is very challenging to apply to programs built using event-driven frameworks, such as Android. The main reason is that the framework code itself is too ...
    • SymDroid: Symbolic Execution for Dalvik Bytecode 

      Jeon, Jinseong; Micinski, Kristopher K.; Foster, Jeffrey S. (2012-07-31)
      Apps on Google's Android mobile device platform are written in Java, but are compiled to a special bytecode language called Dalvik. In this paper, we introduce SymDroid, a symbolic executor that operates directly on Dalvik ...
    • Troyd: Integration Testing for Android 

      Jeon, Jinseong; Foster, Jeffrey S. (2012-08-24)
      We introduce Troyd, a new integration testing framework for Android apps. Troyd allows testers to write high-level scripts to drive the app under test as desired, e.g., clicking buttons on the screen, checking the contents ...