DroidReach++: Exploring the reachability of native code in android applications
Modern Android applications often incorporate numerous native C/C++ libraries to efficiently handle CPU-intensive tasks or interact at a low level with specific hardware, such as performing specialized GPU rendering. Recent research on Android security has revealed that these libraries are frequentl...
Saved in:
| Published in: | Computers & security Vol. 159; p. 104657 |
|---|---|
| Main Authors: | , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Elsevier Ltd
01.12.2025
|
| Subjects: | |
| ISSN: | 0167-4048 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Modern Android applications often incorporate numerous native C/C++ libraries to efficiently handle CPU-intensive tasks or interact at a low level with specific hardware, such as performing specialized GPU rendering. Recent research on Android security has revealed that these libraries are frequently adopted by third-party developers and may pose security risks if not regularly updated, as publicly disclosed vulnerabilities in outdated libraries can be exploited by malicious actors. To determine whether these known vulnerabilities represent an immediate and tangible threat, it is essential to assess whether the vulnerable functions can be executed during application runtime – a research problem commonly known as function reachability. In this article, we introduce DroidReach++, a novel static analysis approach for evaluating the reachability of native function calls in Android applications. Our framework overcomes the limitations of existing state-of-the-art methods by combining heuristics with symbolic execution, enabling a more precise reconstruction of Inter-procedural Control-Flow Graphs (ICFGs). When applied to the top 500 applications from the Google Play Store, DroidReach++ identifies a significantly higher number of execution paths compared to previous techniques. Finally, two case studies demonstrate how DroidReach++ serves as an effective tool for vulnerability assessment. |
|---|---|
| AbstractList | Modern Android applications often incorporate numerous native C/C++ libraries to efficiently handle CPU-intensive tasks or interact at a low level with specific hardware, such as performing specialized GPU rendering. Recent research on Android security has revealed that these libraries are frequently adopted by third-party developers and may pose security risks if not regularly updated, as publicly disclosed vulnerabilities in outdated libraries can be exploited by malicious actors. To determine whether these known vulnerabilities represent an immediate and tangible threat, it is essential to assess whether the vulnerable functions can be executed during application runtime – a research problem commonly known as function reachability. In this article, we introduce DroidReach++, a novel static analysis approach for evaluating the reachability of native function calls in Android applications. Our framework overcomes the limitations of existing state-of-the-art methods by combining heuristics with symbolic execution, enabling a more precise reconstruction of Inter-procedural Control-Flow Graphs (ICFGs). When applied to the top 500 applications from the Google Play Store, DroidReach++ identifies a significantly higher number of execution paths compared to previous techniques. Finally, two case studies demonstrate how DroidReach++ serves as an effective tool for vulnerability assessment. |
| ArticleNumber | 104657 |
| Author | Maiorca, Davide Coppa, Emilio Borzacchiello, Luca Cornacchia, Matteo Giacinto, Giorgio |
| Author_xml | – sequence: 1 givenname: Luca orcidid: 0000-0001-7198-5175 surname: Borzacchiello fullname: Borzacchiello, Luca email: borzacchiello@diag.uniroma1.it organization: Sapienza University of Rome, Italy – sequence: 2 givenname: Matteo orcidid: 0009-0007-1217-5237 surname: Cornacchia fullname: Cornacchia, Matteo email: cornacchia@diag.uniroma1.it organization: Sapienza University of Rome, Italy – sequence: 3 givenname: Davide orcidid: 0000-0003-2640-4663 surname: Maiorca fullname: Maiorca, Davide email: davide.maiorca@unica.it organization: University of Cagliari, Italy – sequence: 4 givenname: Giorgio orcidid: 0000-0002-5759-3017 surname: Giacinto fullname: Giacinto, Giorgio email: giacinto@unica.it organization: University of Cagliari, Italy – sequence: 5 givenname: Emilio orcidid: 0000-0002-8094-871X surname: Coppa fullname: Coppa, Emilio email: ecoppa@luiss.it organization: LUISS University, Italy |
| BookMark | eNp9kE1LAzEQhnOoYKv-AU-5l61Jmv0SL1LrBxQKoueQTiY2ZU2WZCn235ulnj0NvC_PMPPMyMQHj4TccrbgjFd3hwWEhAvBRJkDWZX1hExzUReSyeaSzFI6MMbrqmmmZPsUgzPvqGE_n9_T9U_fhej8Fx32SOMY653r3HCiwVKvB3dECsEgdZ5qb0aY6r7vHOQu-HRNLqzuEt78zSvy-bz-WL0Wm-3L2-pxU4Dgoi6MKZcNVMa2tV5azWtmpNzlk9tGalFKAAO83OVOGgaykm1-gEswVrS2gnZ5RcR5L8SQUkSr-ui-dTwpztSoQR3UqEGNGtRZQ4YezhDmy44Oo0rg0AMaFxEGZYL7D_8FzhpqNQ |
| Cites_doi | 10.1109/TIFS.2018.2866347 10.1016/j.future.2012.02.006 10.1145/2619091 10.1016/j.cose.2021.102368 10.14722/ndss.2017.23096 10.1145/3183575 10.1145/3569936 |
| ContentType | Journal Article |
| Copyright | 2025 The Authors |
| Copyright_xml | – notice: 2025 The Authors |
| DBID | 6I. AAFTH AAYXX CITATION |
| DOI | 10.1016/j.cose.2025.104657 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | 10_1016_j_cose_2025_104657 S0167404825003463 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 6I. 7-5 71M 8P~ 9DU 9JN AAEDT AAEDW AAFTH AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AATTM AAXKI AAXUO AAYFN AAYWO ABBOA ABFSI ABJNI ABMAC ABWVN ABXDB ACDAQ ACGFO ACGFS ACLOT ACNNM ACRLP ACRPL ACVFH ACZNC ADBBV ADCNI ADEZE ADHUB ADJOM ADMUD ADNMO AEBSH AEIPS AEKER AENEX AEUPX AFFNX AFJKZ AFPUW AFTJW AGHFR AGQPQ AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIGII AIIUN AIKHN AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD APXCP ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFKBS EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLX HLZ HVGLF HZ~ IHE J1W KOM LG8 LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RNS ROL RPZ RXW SBC SBM SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ WH7 WUQ XJE XPP XSW YK3 ZMT ~G- ~HD AAYXX CITATION |
| ID | FETCH-LOGICAL-c2127-dd538c6df97a3fa170d44b202984a254ccdc15ba3f4d0c464901614cdf29f6c93 |
| ISSN | 0167-4048 |
| IngestDate | Thu Nov 27 01:01:01 EST 2025 Sat Nov 29 17:02:14 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Mobile security Static analysis Android |
| Language | English |
| License | This is an open access article under the CC BY license. |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c2127-dd538c6df97a3fa170d44b202984a254ccdc15ba3f4d0c464901614cdf29f6c93 |
| ORCID | 0000-0002-5759-3017 0000-0002-8094-871X 0000-0001-7198-5175 0009-0007-1217-5237 0000-0003-2640-4663 |
| OpenAccessLink | https://dx.doi.org/10.1016/j.cose.2025.104657 |
| ParticipantIDs | crossref_primary_10_1016_j_cose_2025_104657 elsevier_sciencedirect_doi_10_1016_j_cose_2025_104657 |
| PublicationCentury | 2000 |
| PublicationDate | December 2025 2025-12-00 |
| PublicationDateYYYYMMDD | 2025-12-01 |
| PublicationDate_xml | – month: 12 year: 2025 text: December 2025 |
| PublicationDecade | 2020 |
| PublicationTitle | Computers & security |
| PublicationYear | 2025 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Sun, Wei, Lui (b41) 2016 NSA (b34) 2016 Borzacchiello, Coppa, Maiorca, Columbu, Demetrescu, Giacinto (b13) 2022; vol. 13556 Documentation (b20) 2021 Gao, Yang, Fu, Jiang, Shi, Sun (b23) 2018 Borzacchiello (b10) 2022 Eschweiler, Yakdan, Gerhards-Padilla (b22) 2016 Bosu, Liu, Yao, Wang (b14) 2017 Oxgalz (b35) 2021 Gordon, Kim, Perkins, Gilham, Nguyen, Rinard (b24) 2015 Yuanchun Li, Ziyue Yang, Yao Guo, Xiangqun Chen (b53) 2017 CVE (b17) 2016 Derr, Bugiel, Fahl, Acar, Backes (b18) 2017 Borzacchiello, Coppa, Demetrescu (b11) 2021 Schwartz, Cohen, Duggan, Gennari, Havrilla, Hines (b37) 2018 Xue, Qian, Zhou, Luo, Zhou, Shao, Chan (b50) 2019 Android (b5) 2021 Wei, Roy, Ou, Robby (b46) 2018 Amalfitano, Fasolino, Tramontana, De Carmine, Memon (b4) 2012 Tan, Croft (b43) 2008 Bello, Pistoia (b8) 2018 Wang, Zhu, Zhou, Yang (b44) 2017 Tan, G., Chakradhar, S., Srivaths, R., Wang, R.D., 2006. Safe Java native interface. In: In Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering. pp. 97–106. Ming, J., Xu, D., Jiang, Y., Wu, D., 2017. BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking. In: 26th USENIX Security Symposium. USENIX Security 17. Lee, Lee, Ryu (b29) 2020 Xue, Zhou, Chen, Luo, Gu (b51) 2017 Gu, Sun, Su, Li, Lu, Ying, Feng (b25) 2017 Li, Tan (b31) 2009 Yan, L.K., Yin, H., 2012. DroidScope: Seamlessly Reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis. In: 21st USENIX Security Symposium. USENIX Security 12. Abraham, Andriatsimandefitra, Brunelat, Lalande, Tong (b1) 2015 Xu, Xu, Chen, Song, Liu, Liu (b49) 2020 Almanee, Ünal, Payer, Garcia (b3) 2021 sirmabus (b39) 2021 Hao, Liu, Nath, Halfond, Govindan (b26) 2014 Strelsky (b40) 2021 Wong, Lie (b48) 2016 Zhang, Heaps, Slavin, Niu, Breaux, Wang (b54) 2023; 32 Desnos (b19) 2021 Almanee (b2) 2021 Hwang, Lee, Kim, Ryu (b27) 2021 Pawlowski, A., Contag, M., van der Veen, V., Ouwehand, C., Holz, T., Bos, H., Athanasopoulos, E., Giuffrida, C., 2017. MARX: Uncovering Class Hierarchies in C++ Programs. In: 24th Annual Network and Distributed System Security Symposium. NDSS ’17. Li, Bartel, Bissyandé, Klein, Le Traon, Arzt, Rasthofer, Bodden, Octeau, McDaniel (b30) 2015 Wen, Zhou, Luo, Russello, Dietrich (b47) 2024 Chen, Zhang, Guo, Li, Wu (b15) 2013 Enck, Gilbert, Han, Tendulkar, Chun, Cox, Jung, McDaniel, Sheth (b21) 2014 Liao, Cai, Zhu, Yin, Li (b32) 2018 Shoshitaishvili, Wang, Salls, Stephens, Polino, Dutcher, Grosen, Feng, Hauser, Krügel, Vigna (b38) 2016 Klieber, Flynn, Bhosale, Jia, Bauer (b28) 2014 Android Developers (b6) 2021 Arzt, Rasthofer, Fritz, Bodden, Bartel, Klein, Le Traon, Octeau, McDaniel (b7) 2014 Wei, Lin, Ou, Chen, Zhang (b45) 2018 Choi, Necula, Sen (b16) 2013 Borzacchiello, Coppa, Demetrescu (b12) 2021 Borzacchiello (b9) 2022 Borzacchiello (10.1016/j.cose.2025.104657_b13) 2022; vol. 13556 Borzacchiello (10.1016/j.cose.2025.104657_b10) 2022 NSA (10.1016/j.cose.2025.104657_b34) 2016 Borzacchiello (10.1016/j.cose.2025.104657_b9) 2022 Gao (10.1016/j.cose.2025.104657_b23) 2018 Bosu (10.1016/j.cose.2025.104657_b14) 2017 sirmabus (10.1016/j.cose.2025.104657_b39) 2021 Abraham (10.1016/j.cose.2025.104657_b1) 2015 Hwang (10.1016/j.cose.2025.104657_b27) 2021 10.1016/j.cose.2025.104657_b33 Xue (10.1016/j.cose.2025.104657_b50) 2019 10.1016/j.cose.2025.104657_b36 Almanee (10.1016/j.cose.2025.104657_b2) 2021 Bello (10.1016/j.cose.2025.104657_b8) 2018 Chen (10.1016/j.cose.2025.104657_b15) 2013 Wen (10.1016/j.cose.2025.104657_b47) 2024 Android (10.1016/j.cose.2025.104657_b5) 2021 Xu (10.1016/j.cose.2025.104657_b49) 2020 Wong (10.1016/j.cose.2025.104657_b48) 2016 CVE (10.1016/j.cose.2025.104657_b17) 2016 Desnos (10.1016/j.cose.2025.104657_b19) 2021 Almanee (10.1016/j.cose.2025.104657_b3) 2021 Documentation (10.1016/j.cose.2025.104657_b20) 2021 Lee (10.1016/j.cose.2025.104657_b29) 2020 Zhang (10.1016/j.cose.2025.104657_b54) 2023; 32 Derr (10.1016/j.cose.2025.104657_b18) 2017 Hao (10.1016/j.cose.2025.104657_b26) 2014 10.1016/j.cose.2025.104657_b42 Shoshitaishvili (10.1016/j.cose.2025.104657_b38) 2016 Choi (10.1016/j.cose.2025.104657_b16) 2013 Li (10.1016/j.cose.2025.104657_b30) 2015 Borzacchiello (10.1016/j.cose.2025.104657_b12) 2021 Arzt (10.1016/j.cose.2025.104657_b7) 2014 Liao (10.1016/j.cose.2025.104657_b32) 2018 Sun (10.1016/j.cose.2025.104657_b41) 2016 Amalfitano (10.1016/j.cose.2025.104657_b4) 2012 Gu (10.1016/j.cose.2025.104657_b25) 2017 10.1016/j.cose.2025.104657_b52 Wei (10.1016/j.cose.2025.104657_b46) 2018 Borzacchiello (10.1016/j.cose.2025.104657_b11) 2021 Oxgalz (10.1016/j.cose.2025.104657_b35) 2021 Strelsky (10.1016/j.cose.2025.104657_b40) 2021 Wang (10.1016/j.cose.2025.104657_b44) 2017 Android Developers (10.1016/j.cose.2025.104657_b6) 2021 Klieber (10.1016/j.cose.2025.104657_b28) 2014 Schwartz (10.1016/j.cose.2025.104657_b37) 2018 Xue (10.1016/j.cose.2025.104657_b51) 2017 Yuanchun Li (10.1016/j.cose.2025.104657_b53) 2017 Wei (10.1016/j.cose.2025.104657_b45) 2018 Enck (10.1016/j.cose.2025.104657_b21) 2014 Eschweiler (10.1016/j.cose.2025.104657_b22) 2016 Li (10.1016/j.cose.2025.104657_b31) 2009 Tan (10.1016/j.cose.2025.104657_b43) 2008 Gordon (10.1016/j.cose.2025.104657_b24) 2015 |
| References_xml | – year: 2021 ident: b11 article-title: Fuzzing symbolic expressions publication-title: Proc. of the 43rd Int. Conf. on Soft. Eng. – start-page: 442 year: 2009 end-page: 452 ident: b31 article-title: Finding bugs in exceptional situations of JNI programs publication-title: Proceedings of the 16th ACM Conference on Computer and Communications Security – year: 2018 ident: b46 article-title: Amandroid: A precise and general inter-component data flow analysis framework for security vetting of Android apps publication-title: ACM Trans. Priv. Secur. – year: 2017 ident: b53 article-title: DroidBot: a lightweight UI-Guided test input generator for Android publication-title: 2017 IEEE/ACM 39th Int. Conf. on Software Engineering – year: 2016 ident: b34 article-title: Ghidra – year: 2016 ident: b48 article-title: IntelliDroid: A targeted input generator for the dynamic analysis of Android malware publication-title: Proceedings 2016 Network and Distributed System Security Symposium – start-page: 427 year: 2017 end-page: 438 ident: b25 article-title: JGRE: An analysis of JNI global reference exhaustion vulnerabilities in android publication-title: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – year: 2018 ident: b37 article-title: Using logic programming to recover C++ classes and methods from compiled executables publication-title: Proc. of the 2018 ACM SIGSAC Conf. on Comp. and Com. Sec. – volume: 32 year: 2023 ident: b54 article-title: DAISY: Dynamic-analysis-induced source discovery for sensitive data publication-title: ACM Trans. Softw. Eng. Methodol. – year: 2021 ident: b5 article-title: Native libraries – year: 2021 ident: b27 article-title: JUSTGen: Effective test generation for unspecified JNI behaviors on JVMs publication-title: 2021 43rd Int. Conf. on Soft. Eng. – year: 2021 ident: b19 article-title: Androguard – year: 2012 ident: b4 article-title: Using GUI ripping for automated testing of android applications publication-title: Proceedings of the 27th IEEE/ACM Int. Conf. on Automated Software Engineering – year: 2022 ident: b10 article-title: DroidReach Benchmarks – year: 2020 ident: b29 article-title: Broadening horizons of multilingual static analysis: Semantic summary extraction from C code for JNI program analysis publication-title: 2020 35th IEEE/ACM Int. Conf. on Automated Software Engineering – year: 2021 ident: b2 article-title: Librarian dataset – year: 2013 ident: b16 article-title: Guided GUI testing of android apps with minimal restart and approximate learning publication-title: Proc. of the 2013 ACM SIGPLAN Int. Conf. on Object Oriented Programming Systems Languages & Applications – start-page: 361 year: 2024 end-page: 372 ident: b47 article-title: Keep me updated: An empirical study on embedded JavaScript engines in android apps publication-title: 2024 IEEE/ACM 21st International Conference on Mining Software Repositories – year: 2008 ident: b43 article-title: An Empirical Security Study of the Native Code in the JDK publication-title: Proc. of the 17th Conf. on Security Symposium – year: 2013 ident: b15 article-title: State of the art: Dynamic symbolic execution for automated test generation publication-title: Future Gener. Comput. Syst. – year: 2017 ident: b14 article-title: Collusive data leak and more: Large-scale threat analysis of inter-app communications publication-title: Proc. of the 2017 ACM on Asia Conf. on Computer and Communications Security – year: 2014 ident: b26 article-title: PUMA: Programmable UI-automation for large-scale dynamic analysis of mobile apps publication-title: Proc. of the 12th Annual Int. Conf. on Mobile Systems, Applications, and Services – year: 2016 ident: b22 article-title: discovRE: Efficient cross-architecture identification of bugs in binary code publication-title: 23rd Annual Network and Distr. Sys. Sec. Symp. – reference: Ming, J., Xu, D., Jiang, Y., Wu, D., 2017. BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking. In: 26th USENIX Security Symposium. USENIX Security 17. – year: 2021 ident: b40 article-title: Ghidra C++ class and run time type information analyzer – year: 2021 ident: b3 article-title: Too quiet in the library: An empirical study of security updates in Android apps’ native code publication-title: 43rd IEEE/ACM Int. Conf. on Software Engineering – year: 2014 ident: b28 article-title: Android taint flow analysis for app sets publication-title: Proc. of the 3rd ACM SIGPLAN Int. Workshop on the State of the Art in Java Program Analysis – reference: Tan, G., Chakradhar, S., Srivaths, R., Wang, R.D., 2006. Safe Java native interface. In: In Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering. pp. 97–106. – year: 2021 ident: b12 article-title: FUZZOLIC: mixing fuzzing and concolic execution publication-title: Comput. Secur. – year: 2016 ident: b38 article-title: SOK: (state of) the art of war: Offensive techniques in binary analysis publication-title: IEEE SP’16 – year: 2018 ident: b45 article-title: JN-SAF: Precise and efficient NDK/JNI-Aware inter-language static analysis framework for security vetting of Android applications with native code publication-title: Proc. of the 2018 ACM SIGSAC Conf. on Computer and Communications Security – year: 2015 ident: b1 article-title: GroddDroid: a gorilla for triggering malicious behaviors publication-title: 10th Int. Conf. on Malicious and Unwanted Software – year: 2017 ident: b18 article-title: Keep me updated: An empirical study of third-party library updatability on Android publication-title: Proc. of the 2017 ACM SIGSAC Conf. on Computer and Communications Security – year: 2020 ident: b49 article-title: Patch based vulnerability matching for binary programs publication-title: Proc. of the 29th ACM SIGSOFT Int. Symp. on Software Testing and Analysis – year: 2021 ident: b20 article-title: Pointer to a native structure in a java field – year: 2017 ident: b51 article-title: Malton: Towards on-device non-invasive mobile malware analysis for ART publication-title: 26th USENIX Security Symposium – year: 2022 ident: b9 article-title: DroidReach – year: 2016 ident: b17 article-title: CVE-2016–2182 – reference: Pawlowski, A., Contag, M., van der Veen, V., Ouwehand, C., Holz, T., Bos, H., Athanasopoulos, E., Giuffrida, C., 2017. MARX: Uncovering Class Hierarchies in C++ Programs. In: 24th Annual Network and Distributed System Security Symposium. NDSS ’17. – year: 2021 ident: b39 article-title: IDA CI plugin – year: 2021 ident: b6 article-title: UI/Application exerciser monkey – year: 2016 ident: b41 article-title: TaintART: A practical multi-level information-flow tracking system for Android RunTime publication-title: Proc. of the 2016 Conf. on Comp. and Com. Sec. – year: 2015 ident: b24 article-title: Information-flow analysis of Android applications in DroidSafe publication-title: Proceedings 2015 Network and Distributed System Security Symposium – year: 2014 ident: b7 article-title: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps publication-title: Proc. of the 35th ACM SIGPLAN Conf. on Programming Language Design and Implementation – year: 2014 ident: b21 article-title: TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones publication-title: ACM Trans. Comput. Syst. – year: 2018 ident: b23 article-title: VulSeeker-pro: Enhanced semantic learning based binary vulnerability seeker with emulation publication-title: Proc. of the 2018 Eur. Soft. Eng. Conf. and Symp. on the Foundations of Soft. Eng. – volume: vol. 13556 start-page: 701 year: 2022 end-page: 722 ident: b13 article-title: Reach me if you can: On native vulnerability reachability in android apps publication-title: Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part III – year: 2021 ident: b35 article-title: Virtuailor – year: 2017 ident: b44 article-title: Droid-AntiRM: Taming control flow anti-analysis to support automated dynamic analysis of Android malware publication-title: Proc. of the 33rd Annual Computer Security Applications Conference – year: 2018 ident: b8 article-title: ARES: Triggering payload of evasive Android malware publication-title: Proc. of the 5th Int. Conf. on Mobile Software Engineering and Systems – year: 2015 ident: b30 article-title: IccTA: Detecting inter-component privacy leaks in Android apps publication-title: 37th IEEE Int. Conf. on Soft. Eng – year: 2019 ident: b50 article-title: NDroid: Toward tracking information flows across multiple Android contexts publication-title: IEEE Trans. Inf. Forensics Secur. – reference: Yan, L.K., Yin, H., 2012. DroidScope: Seamlessly Reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis. In: 21st USENIX Security Symposium. USENIX Security 12. – year: 2018 ident: b32 article-title: MobileFindr: Function similarity identification for reversing mobile binaries publication-title: ESORICS 2018: Computer Security – year: 2018 ident: 10.1016/j.cose.2025.104657_b32 article-title: MobileFindr: Function similarity identification for reversing mobile binaries – ident: 10.1016/j.cose.2025.104657_b42 – year: 2019 ident: 10.1016/j.cose.2025.104657_b50 article-title: NDroid: Toward tracking information flows across multiple Android contexts publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2018.2866347 – year: 2021 ident: 10.1016/j.cose.2025.104657_b3 article-title: Too quiet in the library: An empirical study of security updates in Android apps’ native code – year: 2016 ident: 10.1016/j.cose.2025.104657_b22 article-title: discovRE: Efficient cross-architecture identification of bugs in binary code – year: 2017 ident: 10.1016/j.cose.2025.104657_b53 article-title: DroidBot: a lightweight UI-Guided test input generator for Android – ident: 10.1016/j.cose.2025.104657_b52 – year: 2017 ident: 10.1016/j.cose.2025.104657_b44 article-title: Droid-AntiRM: Taming control flow anti-analysis to support automated dynamic analysis of Android malware – year: 2013 ident: 10.1016/j.cose.2025.104657_b16 article-title: Guided GUI testing of android apps with minimal restart and approximate learning – year: 2018 ident: 10.1016/j.cose.2025.104657_b45 article-title: JN-SAF: Precise and efficient NDK/JNI-Aware inter-language static analysis framework for security vetting of Android applications with native code – year: 2013 ident: 10.1016/j.cose.2025.104657_b15 article-title: State of the art: Dynamic symbolic execution for automated test generation publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2012.02.006 – year: 2014 ident: 10.1016/j.cose.2025.104657_b21 article-title: TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones publication-title: ACM Trans. Comput. Syst. doi: 10.1145/2619091 – year: 2016 ident: 10.1016/j.cose.2025.104657_b17 – year: 2021 ident: 10.1016/j.cose.2025.104657_b5 – year: 2021 ident: 10.1016/j.cose.2025.104657_b39 – year: 2022 ident: 10.1016/j.cose.2025.104657_b9 – year: 2021 ident: 10.1016/j.cose.2025.104657_b12 article-title: FUZZOLIC: mixing fuzzing and concolic execution publication-title: Comput. Secur. doi: 10.1016/j.cose.2021.102368 – year: 2016 ident: 10.1016/j.cose.2025.104657_b34 – year: 2018 ident: 10.1016/j.cose.2025.104657_b23 article-title: VulSeeker-pro: Enhanced semantic learning based binary vulnerability seeker with emulation – year: 2021 ident: 10.1016/j.cose.2025.104657_b40 – start-page: 361 year: 2024 ident: 10.1016/j.cose.2025.104657_b47 article-title: Keep me updated: An empirical study on embedded JavaScript engines in android apps – year: 2020 ident: 10.1016/j.cose.2025.104657_b49 article-title: Patch based vulnerability matching for binary programs – ident: 10.1016/j.cose.2025.104657_b33 – year: 2021 ident: 10.1016/j.cose.2025.104657_b2 – year: 2014 ident: 10.1016/j.cose.2025.104657_b26 article-title: PUMA: Programmable UI-automation for large-scale dynamic analysis of mobile apps – year: 2014 ident: 10.1016/j.cose.2025.104657_b7 article-title: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps – year: 2016 ident: 10.1016/j.cose.2025.104657_b41 article-title: TaintART: A practical multi-level information-flow tracking system for Android RunTime – year: 2018 ident: 10.1016/j.cose.2025.104657_b37 article-title: Using logic programming to recover C++ classes and methods from compiled executables – start-page: 427 year: 2017 ident: 10.1016/j.cose.2025.104657_b25 article-title: JGRE: An analysis of JNI global reference exhaustion vulnerabilities in android – year: 2012 ident: 10.1016/j.cose.2025.104657_b4 article-title: Using GUI ripping for automated testing of android applications – year: 2018 ident: 10.1016/j.cose.2025.104657_b8 article-title: ARES: Triggering payload of evasive Android malware – year: 2015 ident: 10.1016/j.cose.2025.104657_b24 article-title: Information-flow analysis of Android applications in DroidSafe – year: 2017 ident: 10.1016/j.cose.2025.104657_b14 article-title: Collusive data leak and more: Large-scale threat analysis of inter-app communications – year: 2021 ident: 10.1016/j.cose.2025.104657_b11 article-title: Fuzzing symbolic expressions – year: 2015 ident: 10.1016/j.cose.2025.104657_b1 article-title: GroddDroid: a gorilla for triggering malicious behaviors – year: 2016 ident: 10.1016/j.cose.2025.104657_b38 article-title: SOK: (state of) the art of war: Offensive techniques in binary analysis – year: 2014 ident: 10.1016/j.cose.2025.104657_b28 article-title: Android taint flow analysis for app sets – year: 2017 ident: 10.1016/j.cose.2025.104657_b51 article-title: Malton: Towards on-device non-invasive mobile malware analysis for ART – ident: 10.1016/j.cose.2025.104657_b36 doi: 10.14722/ndss.2017.23096 – year: 2022 ident: 10.1016/j.cose.2025.104657_b10 – year: 2008 ident: 10.1016/j.cose.2025.104657_b43 article-title: An Empirical Security Study of the Native Code in the JDK – year: 2021 ident: 10.1016/j.cose.2025.104657_b35 – year: 2020 ident: 10.1016/j.cose.2025.104657_b29 article-title: Broadening horizons of multilingual static analysis: Semantic summary extraction from C code for JNI program analysis – year: 2021 ident: 10.1016/j.cose.2025.104657_b6 – year: 2021 ident: 10.1016/j.cose.2025.104657_b20 – year: 2018 ident: 10.1016/j.cose.2025.104657_b46 article-title: Amandroid: A precise and general inter-component data flow analysis framework for security vetting of Android apps publication-title: ACM Trans. Priv. Secur. doi: 10.1145/3183575 – volume: 32 issue: 4 year: 2023 ident: 10.1016/j.cose.2025.104657_b54 article-title: DAISY: Dynamic-analysis-induced source discovery for sensitive data publication-title: ACM Trans. Softw. Eng. Methodol. doi: 10.1145/3569936 – year: 2015 ident: 10.1016/j.cose.2025.104657_b30 article-title: IccTA: Detecting inter-component privacy leaks in Android apps – year: 2016 ident: 10.1016/j.cose.2025.104657_b48 article-title: IntelliDroid: A targeted input generator for the dynamic analysis of Android malware – volume: vol. 13556 start-page: 701 year: 2022 ident: 10.1016/j.cose.2025.104657_b13 article-title: Reach me if you can: On native vulnerability reachability in android apps – year: 2017 ident: 10.1016/j.cose.2025.104657_b18 article-title: Keep me updated: An empirical study of third-party library updatability on Android – year: 2021 ident: 10.1016/j.cose.2025.104657_b27 article-title: JUSTGen: Effective test generation for unspecified JNI behaviors on JVMs – start-page: 442 year: 2009 ident: 10.1016/j.cose.2025.104657_b31 article-title: Finding bugs in exceptional situations of JNI programs – year: 2021 ident: 10.1016/j.cose.2025.104657_b19 |
| SSID | ssj0017688 |
| Score | 2.4335644 |
| Snippet | Modern Android applications often incorporate numerous native C/C++ libraries to efficiently handle CPU-intensive tasks or interact at a low level with... |
| SourceID | crossref elsevier |
| SourceType | Index Database Publisher |
| StartPage | 104657 |
| SubjectTerms | Android Mobile security Static analysis |
| Title | DroidReach++: Exploring the reachability of native code in android applications |
| URI | https://dx.doi.org/10.1016/j.cose.2025.104657 |
| Volume | 159 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 issn: 0167-4048 databaseCode: AIEXJ dateStart: 19950101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0017688 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaWlgMX3ogCRT7AKcpqN3Ye5tbSUkCoIFSkvUWOHyUVSqrstqo48dM7s3acUB6iB6RVtIqTSZT54ozHn78h5EUqLGOGsVgU1sRcVVks8qSIs7QqKs5llZpqXWwiPzwsFgvxaTL50a-FOf-WN01xcSFO_6urYR84G5fOXsPdwSjsgP_gdNiC22H7T47f69paf0aS5MtkF38w5h-YdmtGITY6fW6nJ-3Ev3F1O6Y_JGoY1Doaz22PY9i-EMRyDZulL4AXxvVt910q9bXuZ3U-nI3YQFgPGRulWye0Wpl2yInXbadkINoHxB3UUtXNutxTdADHHDvqWJ-rSNIR78OnL1Flfea0NUP_6yXBXQ-Kc85OsvqXzt3lGU6myOSfovnpcPDPStpXvnCBd9hT2k5KtFGijdLZuEE2kzwV0C9u7rzbX7wPM1EwHCuCPjzcuV945TiCV-_k98HNKGA5uktu-5EG3XEIuUcmprlP7vTOo75Tf0A-DoCJolc0QIUCVOgYKrS11EGFIlRo3VAPFTqGykPy5c3-0eu3sS-zESuU94-1ho-eyrQVuWRWzvOZ5rxKUJufyyTlSmk1Tyto43qmeMYFDhO40jYRNlOCPSIbTduYx4SmVZYnc8bYzMK5EAdlBt53TDJqYWyVbZGofz7lqVNTKf_sky2S9o-w9PGgi_NKQMRfzntyras8JbcGqD4jG6vuzGyTm-p8VS-75x4Ol0SDgFM |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=DroidReach%2B%2B%3A+Exploring+the+reachability+of+native+code+in+android+applications&rft.jtitle=Computers+%26+security&rft.au=Borzacchiello%2C+Luca&rft.au=Cornacchia%2C+Matteo&rft.au=Maiorca%2C+Davide&rft.au=Giacinto%2C+Giorgio&rft.date=2025-12-01&rft.issn=0167-4048&rft.volume=159&rft.spage=104657&rft_id=info:doi/10.1016%2Fj.cose.2025.104657&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_cose_2025_104657 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon |