-
Improving privacy on android smartphones through in-vivo bytecode instrumenta...
In this paper we claim that a widely applicable and efficient means to fight against malicious mobile Android applications is: 1) to per- form runtime monitoring 2) by... -
Dexpler: Converting Android Dalvik Bytecode to Jimple for Static Analysis wit...
International audience -
Automatically Securing Permission-Based Software by Reducing the Attack Surfa...
A common security architecture, called the permission-based security model (used e.g. in Android and Blackberry), entails intrinsic risks. For instance, applications... -
The Pervasive Fridge. A smart computer system against uneaten food loss
International audience -
Hiding privacy leaks in Android applications using low-attention raising cove...
International audience -
Information Flow Policies vs Malware
Application markets offer more than 700'000 applications: music, movies, games or small tools. It appears more and more difficult to propose an automatic and... -
Virtual Stick in Caret Positioning on Touch Screens
International audience -
Shortest path problem for mobile devices in urban area
International audience -
I know what leaked in your pocket: uncovering privacy leaks on Android Apps w...
Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-component data-flow analysis to detect privacy leaks between...
