Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation

Lannan Luo, Qiang Zeng 0001, Chen Cao, Kai Chen 0012, Jian Liu 0008, Limin Liu, Neng Gao, Min Yang 0002, Xinyu Xing, Peng Liu 0005. Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation. IEEE Trans. Mob. Comput., 19(12):2946-2964, 2020. [doi]

Authors

Lannan Luo

This author has not been identified. It may be one of the following persons: Look up 'Lannan Luo' in Google

Qiang Zeng 0001

This author has not been identified. Look up 'Qiang Zeng 0001' in Google

Chen Cao

This author has not been identified. Look up 'Chen Cao' in Google

Kai Chen 0012

This author has not been identified. Look up 'Kai Chen 0012' in Google

Jian Liu 0008

This author has not been identified. Look up 'Jian Liu 0008' in Google

Limin Liu

This author has not been identified. Look up 'Limin Liu' in Google

Neng Gao

This author has not been identified. Look up 'Neng Gao' in Google

Min Yang 0002

This author has not been identified. Look up 'Min Yang 0002' in Google

Xinyu Xing

This author has not been identified. Look up 'Xinyu Xing' in Google

Peng Liu 0005

This author has not been identified. Look up 'Peng Liu 0005' in Google