- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources5
- Resource Type
-
0005000000000000
- More
- Availability
-
50
- Author / Contributor
- Filter by Author / Creator
-
-
Lin, Zhiqiang (5)
-
Zhao, Qingchuan (5)
-
Wen, Haohuang (3)
-
Shroff, Ness B. (2)
-
Xuan, Dong (2)
-
Zuo, Chaoshun (2)
-
Blasco, Jorge (1)
-
Chen, Qi Alfred (1)
-
Dolan-Gavitt, Brendan (1)
-
Pellegrino, Giancarlo (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
& Ahmed, K. (0)
-
& Ahmed, Khadija. (0)
-
& Aina, D.K. Jr. (0)
-
& Akcil-Okan, O. (0)
-
- Filter by Editor
-
-
null (2)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Zhao, Qingchuan; Zuo, Chaoshun; Dolan-Gavitt, Brendan; Pellegrino, Giancarlo; Lin, Zhiqiang (, Proceedings of the IEEE Symposium on Security and Privacy)Mobile applications (apps) have exploded in popularity, with billions of smartphone users using millions of apps available through markets such as the Google Play Store or the Apple App Store. While these apps have rich and useful functionality that is publicly exposed to end users, they also contain hidden behaviors that are not disclosed, such as backdoors and blacklists designed to block unwanted content. In this paper, we show that the input validation behavior---the way the mobile apps process and respond to data entered by users---can serve as a powerful tool for uncovering such hidden functionality. We therefore have developed a tool, InputScope, that automatically detects both the execution context of user input validation and also the content involved in the validation, to automatically expose the secrets of interest. We have tested InputScope with over 150,000 mobile apps, including popular apps from major app stores and pre-installed apps shipped with the phone, and found 12,706 mobile apps with backdoor secrets and 4,028 mobile apps containing blacklist secrets.more » « less
-
Wen, Haohuang; Zhao, Qingchuan; Chen, Qi Alfred; Lin, Zhiqiang (, Proceedings 2020 Network and Distributed System Security Symposium (NDSS'20))
-
Wen, Haohuang; Zhao, Qingchuan; Lin, Zhiqiang; Xuan, Dong; Shroff, Ness B. (, International Conference on Security and Privacy in Communication Systems (SecureComm))null (Ed.)
-
Zhao, Qingchuan; Wen, Haohuang; Lin, Zhiqiang; Xuan, Dong; Shroff, Ness B. (, International Conference on Security and Privacy in Communication Systems (SecureComm))null (Ed.)
An official website of the United States government

Full Text Available