(2014). Enter sandbox: Android sandbox compari-
son. In Koved, L., Singh, K., Chen, H., and Just, M.,
editors, Proceedings of the Third Workshop on Mobile
Security Technologies (MoST) 2014.
Portokalidis, G., Homburg, P., Anagnostakis, K., and Bos,
H. (2010). Paranoid android: versatile protection for
smartphones. In Gates, C., Franz, M., and McDer-
mott, J., editors, Proceedings of the 26th Annual Com-
puter Security Applications Conference (ACSAC ’10),
page 347.
QEMU Project (2017). Documentation/networking.
Qian, C., Luo, X., Shao, Y., and Chan, A. T. (2014). On
tracking information flows through jni in android ap-
plications. In 2014 44th Annual IEEE/IFIP Interna-
tional Conference on Dependable Systems and Net-
works (DSN), pages 180–191. IEEE.
Rasthofer, S., Arzt, S., Miltenberger, M., and Bodden, E.
(February 21-24, 2016). Harvesting runtime values
in android applications that feature anti-analysis tech-
niques. In Capkun, S., editor, Proceedings 2016 Net-
work and Distributed System Security Symposium. In-
ternet Society.
Rastogi, V., Chen, Y., and Enck, W. (2013). Appsplay-
ground: automatic security analysis of smartphone ap-
plications. In Bertino, E., Sandhu, R., Bauer, L., and
Park, J., editors, Proceedings of the third ACM con-
ference on Data and application security and privacy,
page 209.
Russello, G., Conti, M., Crispo, B., and Fernandes, E.
(2012). Moses: Supporting operation modes on smart-
phones. In Proceedings of the 17th ACM symposium
on Access Control Models and Technologies - SAC-
MAT ’12, page 3. ACM Press.
Russello, G., Crispo, B., Fernandes, E., and Zhauniarovich,
Y. (2011). Yaase: Yet another android security exten-
sion. In 2011 IEEE Third Int’l Conference on Privacy,
Security, Risk and Trust (PASSAT) / 2011 IEEE Third
Int’l Conference on Social Computing (SocialCom),
pages 1033–1040.
Sarwar, G., Mehani, O., Boreli, R., and Kaafar, M. A.
(2013). On the effectiveness of dynamic taint anal-
ysis for protecting against private information leaks
on android-based devices. In Samarati, P., editor, SE-
CRYPT 2013, 10th International Conference on Secu-
rity and Cryptography. SciTePress.
Shirey, R. (2007). Rfc 4949: Internet security glossary, ver-
sion 2.
Spreitzenbarth, M., Freiling, F., Echtler, F., Schreck, T.,
and Hoffmann, J. (2013). Mobile-sandbox: having
a deeper look into android applications. In Shin, S. Y.
and Maldonado, J. C., editors, the 28th Annual ACM
Symposium, page 1808.
Spreitzenbarth, M., Schreck, T., Echtler, F., Arp, D., and
Hoffmann, J. (2015). Mobile-sandbox: combining
static and dynamic analysis with machine-learning
techniques: Combining static and dynamic analy-
sis with machine-learning techniques. International
Journal of Information Security, 14(2):141–153.
Sufatrio, Tan, D. J. J., Chua, T.-W., and Thing, V. L. L.
(2015). Securing android: A survey, taxonomy, and
challenges. ACM Computing Surveys, 47(4):1–45.
Sun, M., Wei, T., and Lui, J. C. (2016). Taintart: A prac-
tical multi-level information-flow tracking system for
android runtime. In Katzenbeisser, S. and Weippl, E.,
editors, Proceedings of the 2016 ACM SIGSAC Con-
ference on Computer and Communications Security,
pages 331–342. Association for Computing Machin-
ery.
Tam, K., Feizollah, A., Anuar, N. B., Salleh, R., and Caval-
laro, L. (2017). The evolution of android malware and
android analysis techniques. ACM Computing Sur-
veys, 49(4):1–41.
Wei, F., Roy, S., Ou, X., and Robby (2014). Amandroid: A
precise and general inter-component data flow analy-
sis framework for security vetting of android apps. In
Ahn, G.-J., editor, Proceedings of the 21st ACM Con-
ference on Computer and Communications Security,
pages 1329–1341. ACM.
Weichselbaum, L., Neugschwandter, M., Lindorfer, M.,
Fratantonio, Y., van der Veen, V., and Platzer, C.
(2014). Andrubis: Android malware under the mag-
nifying glass.
Xia, M., Gong, L., Lyu, Y., Qi, Z., and Liu, X. (2015). Ef-
fective real-time android application auditing. In 2015
IEEE Symposium on Security and Privacy (SP), pages
899–914. IEEE.
Xu, M., Qian, C., Lee, S., Kim, T., Song, C., Ji, Y., Shih,
M.-W., Lu, K., Zheng, C., Duan, R., Jang, Y., and
Lee, B. (2016). Toward engineering a secure android
ecosystem. ACM Computing Surveys, 49(2):1–47.
You, W., Liang, B., Shi, W., Wang, P., and Zhang, X.
(2017). Taintman: An art-compatible dynamic taint
analysis framework on unmodified and non-rooted an-
droid devices. IEEE Transactions on Dependable and
Secure Computing, page 1.
Zhang, Y., Yang, M., Xu, B., Yang, Z., Gu, G., Ning, P.,
Wang, X. S., and Zang, B. (2013). Vetting undesirable
behaviors in android apps with permission use analy-
sis. In Sadeghi, A.-R., Gligor, V., and Yung, M., edi-
tors, The 2013 ACM SIGSAC conference, pages 611–
622.
Zhauniarovich, Y., Russello, G., Conti, M., Crispo, B.,
and Fernandes, E. (2014). Moses: Supporting and
enforcing security profiles on smartphones. IEEE
Transactions on Dependable and Secure Computing,
11(3):211–223.
Zheng, M., Sun, M., and Lui, J. C. (2014). Droid-
trace: A ptrace based android dynamic analysis sys-
tem with forward execution capability. In 2014 Inter-
national Wireless Communications and Mobile Com-
puting Conference (IWCMC), pages 128–133.
Dynamic Taint-tracking: Directions for Future Research
305