![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-App Data Leakage
There exists a need for overall security analysis of a set of apps. We demonstrate IacCE, a tool implementing our approach that applies concolic execution on combined apps guided by extended Inter-App taint pa...
-
Chapter and Conference Paper
CapaDroid: Detecting Capability Leak for Android Applications
Android app capabilities are restricted by the Android sand-boxing security enforcement. However, an app may leak its capabilities to other applications so that the latter can act beyond the permission they a...
-
Chapter and Conference Paper
AppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Dependency Graph
Dynamic analyzing techniques play an important and unique role in detecting Android malware and vulnerabilities, as they can provide higher precision than static methods. However, they are inherently incomple...
-
Chapter and Conference Paper
A PHD-Filter-Based Multitarget Tracking Algorithm for Sensor Networks
Because of their applications potentials, sensor networks have attracted much attention in recent years. The problem addressed in this paper is multitarget tracking in sensor networks. In order to strike a bal...