Arzt et al., 2013 - Google Patents
Instrumenting android and java applications as easy as abcArzt et al., 2013
View PDF- Document ID
- 15269198906952822065
- Author
- Arzt S
- Rasthofer S
- Bodden E
- Publication year
- Publication venue
- International Conference on Runtime Verification
External Links
Snippet
Program instrumentation is a widely used mechanism in different software engineering areas. It can be used for creating profilers and debuggers, for detecting programming errors at runtime, or for securing programs through inline reference monitoring. This paper …
- OKTJSMMVPCPJKN-UHFFFAOYSA-N carbon data:image/svg+xml;base64,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 data:image/svg+xml;base64,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 [C] 0 abstract description 33
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/445—Programme loading or initiating
- G06F9/44521—Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/4421—Execution paradigms
- G06F9/4428—Object-oriented
- G06F9/443—Object-oriented method invocation or resolution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
- G06F11/3636—Software debugging by tracing the execution of the program
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
- G06F8/41—Compilation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Arzt et al. | Instrumenting android and java applications as easy as abc | |
| Backes et al. | Artist: The android runtime instrumentation and security toolkit | |
| Sun et al. | Taintart: A practical multi-level information-flow tracking system for android runtime | |
| Xue et al. | Ndroid: Toward tracking information flows across multiple android contexts | |
| Elsabagh et al. | {FIRMSCOPE}: Automatic uncovering of {Privilege-Escalation} vulnerabilities in {Pre-Installed} apps in android firmware | |
| Peng et al. | {X-Force}:{Force-Executing} binary programs for security applications | |
| Xue et al. | Adaptive unpacking of Android apps | |
| Roundy et al. | Binary-code obfuscations in prevalent packer tools | |
| You et al. | Taintman: An art-compatible dynamic taint analysis framework on unmodified and non-rooted android devices | |
| Song et al. | BitBlaze: A new approach to computer security via binary analysis | |
| Reaves et al. | * droid: Assessment and evaluation of android application analysis tools | |
| Zhang et al. | IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time | |
| Arzt et al. | The soot-based toolchain for analyzing android apps | |
| Johnson et al. | Forced-path execution for android applications on x86 platforms | |
| Filho et al. | Evasion and countermeasures techniques to detect dynamic binary instrumentation frameworks | |
| Dresel et al. | Artist: the android runtime instrumentation toolkit | |
| Luo | Heap memory snapshot assisted program analysis for android permission specification | |
| Miller et al. | Crash analysis with BitBlaze | |
| Geist et al. | Jailbreak/root detection evasion study on iOS and Android | |
| Pagano et al. | Obfuscating code vulnerabilities against static analysis in android apps | |
| Soriano-Salvador et al. | Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation | |
| Furia et al. | Challenges of multilingual program specification and analysis | |
| Gudka et al. | Exploring compartmentalisation hypotheses with SOAAP | |
| He et al. | Jni global references are still vulnerable: Attacks and defenses | |
| Cesarano et al. | Gosurf: identifying software supply chain attack vectors in Go |