On return oriented programming threats in Android runtime
Android has taken a large share of operating systems forsmart devices including smartphones, and has been an attractive target to theattackers. The arms race between attackers and defenders typically occurs ontwo front lines — the latest attacking technology and the latest updates to theoperating sy...
Saved in:
Main Authors: | RAJA, Akshaya Venkateswara, LEE, Jehyun, GAO, Debin |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4023 https://ink.library.smu.edu.sg/context/sis_research/article/5025/viewcontent/pst17__1_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
SplitSecond: Flexible privilege separation of Android apps
by: LEE, Jehyun, et al.
Published: (2019) -
Measuring the declared SDK versions and their consistency with API calls in android apps
by: WU, Daoyuan, et al.
Published: (2017) -
deRop: Removing Return-Oriented Programming from Malware
by: LU, Kangjie, et al.
Published: (2011) -
RopSteg: Program steganography with return oriented programming
by: LU, Kangjie, et al.
Published: (2014) -
Runtime binary analysis for security
by: SARAVANAN SINNADURAI S/O GUNACHILAN
Published: (2010)