Provided by: University of Luxembourg
In this paper, the authors claim that a widely applicable and efficient means to fight against malicious mobile Android applications is: to perform runtime monitoring, by instrumenting the application bytecode and in-vivo, i.e. directly on the Smartphone. They present a tool chain to do this and present experimental results showing that this tool chain can run on Smartphones in a reasonable amount of time and with a realistic effort. Their findings also identify challenges to be addressed before running powerful runtime monitoring and instrumentations directly on Smartphones.