Zum Hauptinhalt springen

Showing 1–15 of 15 results for author: Samhi, J

.
  1. arXiv:2407.07804  [pdf, other

    cs.SE

    Call Graph Soundness in Android Static Analysis

    Authors: Jordan Samhi, René Just, Tegawendé F. Bissyandé, Michael D. Ernst, Jacques Klein

    Abstract: Static analysis is sound in theory, but an implementation may unsoundly fail to analyze all of a program's code. Any such omission is a serious threat to the validity of the tool's output. Our work is the first to measure the prevalence of these omissions. Previously, researchers and analysts did not know what is missed by static analysis, what sort of code is missed, or the reasons behind these o… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

  2. arXiv:2405.05117  [pdf, other

    cs.CR

    (In)Security of Mobile Apps in Developing Countries: A Systematic Literature Review

    Authors: Alioune Diallo, Jordan Samhi, Tegawendé Bissyandé, Jacques Klein

    Abstract: In developing countries, several key sectors, including education, finance, agriculture, and healthcare, mainly deliver their services via mobile app technology on handheld devices. As a result, mobile app security has emerged as a paramount issue in developing countries. In this paper, we investigate the state of research on mobile app security, focusing on developing countries. More specifically… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 18 pages, 1 figure, submitted to a well-known journal

  3. arXiv:2404.11223  [pdf, other

    cs.SE

    AndroLog: Android Instrumentation and Code Coverage Analysis

    Authors: Jordan Samhi, Andreas Zeller

    Abstract: Dynamic analysis has emerged as a pivotal technique for testing Android apps, enabling the detection of bugs, malicious code, and vulnerabilities. A key metric in evaluating the efficacy of tools employed by both research and practitioner communities for this purpose is code coverage. Obtaining code coverage typically requires planting probes within apps to gather coverage data during runtime. Due… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

  4. arXiv:2402.08801  [pdf, ps, other

    cs.SE cs.AI

    ChatGPT vs LLaMA: Impact, Reliability, and Challenges in Stack Overflow Discussions

    Authors: Leuson Da Silva, Jordan Samhi, Foutse Khomh

    Abstract: Since its release in November 2022, ChatGPT has shaken up Stack Overflow, the premier platform for developers' queries on programming and software development. Demonstrating an ability to generate instant, human-like responses to technical questions, ChatGPT has ignited debates within the developer community about the evolving role of human-driven platforms in the age of generative AI. Two months… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

    Comments: 36 pages, 9 figures

  5. arXiv:2310.07290  [pdf, other

    cs.SE

    Revisiting Android App Categorization

    Authors: Marco Alecci, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: Numerous tools rely on automatic categorization of Android apps as part of their methodology. However, incorrect categorization can lead to inaccurate outcomes, such as a malware detector wrongly flagging a benign app as malicious. One such example is the SlideIT Free Keyboard app, which has over 500000 downloads on Google Play. Despite being a "Keyboard" app, it is often wrongly categorized along… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

    Comments: Accepted at ICSE2024

  6. AndroLibZoo: A Reliable Dataset of Libraries Based on Software Dependency Analysis

    Authors: Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: Android app developers extensively employ code reuse, integrating many third-party libraries into their apps. While such integration is practical for developers, it can be challenging for static analyzers to achieve scalability and precision when libraries account for a large part of the code. As a direct consequence, it is common practice in the literature to consider developer code only during s… ▽ More

    Submitted 8 February, 2024; v1 submitted 24 July, 2023; originally announced July 2023.

  7. arXiv:2301.03207  [pdf, other

    cs.CR cs.SE

    Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection

    Authors: Jordan Samhi, Maria Kober, Abdoul Kader Kabore, Steven Arzt, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: Apps on mobile phones manipulate all sorts of data, including sensitive data, leading to privacy-related concerns. Recent regulations like the European GDPR provide rules for the processing of personal and sensitive data, like that no such data may be leaked without the consent of the user. Researchers have proposed sophisticated approaches to track sensitive data within mobile apps, all of whic… ▽ More

    Submitted 11 January, 2023; v1 submitted 9 January, 2023; originally announced January 2023.

    Comments: 30th IEEE International Conference on Software Analysis, Evolution and Reengineering, RENE track

  8. arXiv:2210.10997  [pdf, other

    cs.CR cs.SE

    Demystifying Hidden Sensitive Operations in Android apps

    Authors: Xiaoyu Sun, Xiao Chen, Li Li, Haipeng Cai, John Grundy, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: Security of Android devices is now paramount, given their wide adoption among consumers. As researchers develop tools for statically or dynamically detecting suspicious apps, malware writers regularly update their attack mechanisms to hide malicious behavior implementation. This poses two problems to current research techniques: static analysis approaches, given their over-approximations, can repo… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

    Journal ref: ACM Transactions on Software Engineering and Methodology, 2022

  9. arXiv:2203.04448  [pdf, other

    cs.CR cs.SE

    TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs

    Authors: Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: Many Android apps analyzers rely, among other techniques, on dynamic analysis to monitor their runtime behavior and detect potential security threats. However, malicious developers use subtle, though efficient, techniques to bypass dynamic analyzers. Logic bombs are examples of popular techniques where the malicious code is triggered only under specific circumstances, challenging comprehensive dyn… ▽ More

    Submitted 8 March, 2022; originally announced March 2022.

    Comments: In the proceedings of the 19th International Conference on Mining Software Repositories, Data Showcase, (MSR 2022)

  10. arXiv:2112.10470  [pdf, other

    cs.CR cs.SE

    Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps

    Authors: Jordan Samhi, Li Li, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: One prominent tactic used to keep malicious behavior from being detected during dynamic test campaigns is logic bombs, where malicious operations are triggered only when specific conditions are satisfied. Defusing logic bombs remains an unsolved problem in the literature. In this work, we propose to investigate Suspicious Hidden Sensitive Operations (SHSOs) as a step towards triaging logic bombs.… ▽ More

    Submitted 23 January, 2022; v1 submitted 20 December, 2021; originally announced December 2021.

    Comments: In the proceedings of the 44th International Conference on Software Engineering 2022 (ICSE 2022)

  11. arXiv:2112.10469  [pdf, other

    cs.SE

    JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis

    Authors: Jordan Samhi, Jun Gao, Nadia Daoudi, Pierre Graux, Henri Hoyez, Xiaoyu Sun, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: Native code is now commonplace within Android app packages where it co-exists and interacts with Dex bytecode through the Java Native Interface to deliver rich app functionalities. Yet, state-of-the-art static analysis approaches have mostly overlooked the presence of such native code, which, however, may implement some key sensitive, or even malicious, parts of the app behavior. This limitation o… ▽ More

    Submitted 23 January, 2022; v1 submitted 20 December, 2021; originally announced December 2021.

    Comments: In the proceedings of the 44th International Conference on Software Engineering 2022 (ICSE 2022)

  12. arXiv:2109.03326  [pdf, ps, other

    cs.CR cs.LG

    DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection based on Image Representation of Bytecode

    Authors: Nadia Daoudi, Jordan Samhi, Abdoul Kader Kabore, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: Computer vision has witnessed several advances in recent years, with unprecedented performance provided by deep representation learning research. Image formats thus appear attractive to other fields such as malware detection, where deep learning on images alleviates the need for comprehensively hand-crafted features generalising to different malware variants. We postulate that this research direct… ▽ More

    Submitted 5 September, 2021; originally announced September 2021.

    Comments: This manuscript has been accepted at MLHat 2021, and it will be archived in Springer Communications in Computer and Information Science (CCIS)

  13. arXiv:2108.10381  [pdf, other

    cs.CR cs.SE

    On The (In)Effectiveness of Static Logic Bomb Detector for Android Apps

    Authors: Jordan Samhi, Alexandre Bartel

    Abstract: Android is present in more than 85% of mobile devices, making it a prime target for malware. Malicious code is becoming increasingly sophisticated and relies on logic bombs to hide itself from dynamic analysis. In this paper, we perform a large scale study of TSOPEN, our open-source implementation of the state-of-the-art static logic bomb scanner TRIGGERSCOPE, on more than 500k Android application… ▽ More

    Submitted 25 August, 2021; v1 submitted 23 August, 2021; originally announced August 2021.

  14. arXiv:2012.09916  [pdf, other

    cs.SE

    RAICC: Revealing Atypical Inter-Component Communication in Android Apps

    Authors: Jordan Samhi, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: Inter-Component Communication (ICC) is a key mechanism in Android. It enables developers to compose rich functionalities and explore reuse within and across apps. Unfortunately, as reported by a large body of literature, ICC is rather "complex and largely unconstrained", leaving room to a lack of precision in apps modeling. To address the challenge of tracking ICCs within apps, state of the art st… ▽ More

    Submitted 15 January, 2021; v1 submitted 17 December, 2020; originally announced December 2020.

    Comments: In the proceedings of the 43rd International Conference on Software Engineering 2021 (ICSE 2021)

  15. arXiv:2006.11002  [pdf, other

    cs.SE cs.CY

    A First Look at Android Applications in Google Play related to Covid-19

    Authors: Jordan Samhi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: Due to the convenience of access-on-demand to information and business solutions, mobile apps have become an important asset in the digital world. In the context of the Covid-19 pandemic, app developers have joined the response effort in various ways by releasing apps that target different user bases (e.g., all citizens or journalists), offer different services (e.g., location tracking or diagnost… ▽ More

    Submitted 15 January, 2021; v1 submitted 19 June, 2020; originally announced June 2020.

    Comments: Accepted in Empirical Software Engineering under reference: EMSE-D-20-00211R1