EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.

Yinzhi Cao,Yanick Fratantonio,Antonio Bianchi,Manuel Egele,Christopher Kruegel,Giovanni Vigna,Yan Chen
DOI: https://doi.org/10.14722/ndss.2015.23140
2015-01-01
Abstract:Android users can choose from over one million applications (apps) offered through the official Google Play marketplace. Furthermore, a wealth of alternative sources for Android applications is available for users to choose from. These range from curated stores, such as Amazon’s Appstore to less legitimate sources that offer pirated content. The sheer number of mobile applications prompted researchers from academia and industry to develop static analysis techniques that scrutinize these applications for vulnerabilities and malicious functionality. Android applications always execute in the context of the Android framework — a comprehensive collection of functionality that developers can conveniently use from their applications. The prolific use of the framework poses unique challenges for the analysis of Android applications.
What problem does this paper attempt to address?