Главная
Study mode:
on
1
Introduction
2
Motivating Example (1): Blacklist
3
Motivating Example (): Master Password
4
Motivating Example (ill): Access Key
5
Introducing InputScope
6
Detailed Design: Input Validation Detection
7
Detailed Design: Compared Content Resolution
8
Detailed Design: Comparison Context Recovery
9
Detailed Design: Secret Uncovering
10
Experiment Results: Overall
11
Experiment Results: Access Key
12
Experiment Results: Master Password
13
Experiment Results: Secret Command
14
Experiment Results: Blacklist
15
Discussion
16
Related Work
17
Summary
Description:
Explore the hidden behaviors in mobile apps through an analysis of input validation techniques. Learn how to uncover undisclosed functionalities like backdoors and blacklists using INPUTSCOPE, an automated tool designed to detect execution contexts and content involved in user input validation. Discover the findings from a comprehensive study of over 150,000 mobile apps, including popular and pre-installed applications, revealing thousands of apps with hidden backdoor secrets and blacklist content. Gain insights into the detailed design of INPUTSCOPE, including input validation detection, content resolution, context recovery, and secret uncovering. Examine experiment results across various secret types such as access keys, master passwords, secret commands, and blacklists. Discuss the implications of these findings and related work in the field of mobile app security.

Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps

IEEE
Add to list