Jingzhe Li

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
In this paper, a comprehensive analysis of implicit information flow (IIF) on the Android bytecode is presented to identify all potential IIF forms, determine their exploitability, and mitigate the potential threat. By applying control-transfer-oriented semantic analysis of the bytecode language, we identify five IIF forms, some of which are not studied by(More)
  • 1