作者: Ryan Johnson , Angelos Stavrou
关键词:
摘要: We present a code analysis framework that performs scalable forced-path execution of Android applications in commodity hardware. Our goal is to reveal the full application functional behavior for large commercial without access source code. do so by identifying blocks and API calls are deemed sensitive provide security report an analyst regarding functionality under inspection. show our approach allowing each software component numerous instances modules. Each instance exercises different path through call-graph leading state space coverage exposing any hidden or unwanted functionality. The output list calls, parameter values, call graphs, control flow graphs. how this can be leveraged automated policy enforcement runtime