1 code implementation • 24 May 2014 • Daoyuan Wu, Xiapu Luo, Rocky K. C. Chang
We implement our sink-driven approach in a tool called ECVDetector and evaluate it with the top 1K Android apps.
Cryptography and Security
no code implementations • 17 Apr 2014 • Daoyuan Wu, Rocky K. C. Chang
We design an automated system to dynamically test 115 browser apps collected from Google Play and find that 64 of them are vulnerable to the attacks.
Cryptography and Security