Write a Blog >>
ASE 2020
Mon 21 - Fri 25 September 2020 Melbourne, Australia
Tue 22 Sep 2020 10:35 - 10:40 at Koala - LBR + DS Poster (1) Chair(s): Kevin Lee

Since the new privacy feature in iOS enabling users to acknowledge which app is reading or writing to his or her clipboard through prompting notifications was updated, a plethora of top apps have been reported to frequently access the clipboard without user consent. However, the lack of monitoring and control of Android application’s access to the clipboard data leave Android users blind to their potential to leak private information from Android clipboards, raising severe security and privacy concerns. In this preliminary work, we envisage and investigate an approach to (i) dynamically detect clipboard access behaviour, and (ii) determine privacy leaks via static data flow analysis, in which we enhance the results of taint analysis with call graph concatenation to enable leakage source backtracking. Our preliminary results indicate that the proposed method can expose clipboard data leakage as substantiated by our discovery of a popular app, Sogou Input, directly monitoring and transferring user data in a clipboard to backend servers.

Tue 22 Sep

Displayed time zone: (UTC) Coordinated Universal Time change

10:20 - 11:20
LBR + DS Poster (1)Late Breaking Results / Doctoral Symposium at Koala
Chair(s): Kevin Lee Deakin University
10:20
5m
Poster
Efficient Multiplex Symbolic Execution with Adaptive Search Strategy
Late Breaking Results
Tianqi Zhang National University of Defense Technology, Yufeng Zhang College of Information Science and Engineering, Hunan University, Zhenbang Chen College of Computer, National University of Defense Technology, Changsha, PR China, Ziqi Shuai National University of Defense Technology, Ji Wang National University of Defense Technology
10:25
5m
Poster
Styx: A Data-Oriented Mutation Framework to Improve the Robustness of DNN
Late Breaking Results
Meixi Liu National University of Defense Technology, Changsha, China, Weijiang Hong National University of Defense Technology, Changsha, China, Weiyu Pan National University of Defense Technology, Changsha, China, Chendong Feng College of Computer, National University of Defense Technology, Changsha, China, Zhenbang Chen College of Computer, National University of Defense Technology, Changsha, PR China, Ji Wang National University of Defense Technology
10:30
5m
Poster
Synthesizing Smart Solving Strategy for Symbolic Execution
Late Breaking Results
Zehua Chen National University of Defense Technology, Zhenbang Chen College of Computer, National University of Defense Technology, Changsha, PR China, Ziqi Shuai National University of Defense Technology, Yufeng Zhang College of Information Science and Engineering, Hunan University, Weiyu Pan National University of Defense Technology, Changsha, China
10:35
5m
Poster
Privacy Assessment of Android Clipboard
Late Breaking Results
Wei (Zach) Wang The University of Adelaide, Ruoxi Sun The University of Adelaide, Jason Minhui Xue The University of Adelaide, Damith C. Ranasinghe The University of Adelaide
DOI
10:40
5m
Poster
The Symptom, Cause and Repair of Workaround
Late Breaking Results
Daohan Song Shanghai Jiao Tong University, Hao Zhong Shanghai Jiao Tong University, Li Jia Shanghai Jiao Tong University
10:45
5m
Poster
Edge4Sys: A Device-Edge Collaborative Framework for MEC based Smart Systems
Late Breaking Results
Han Gao School of Computer Science and Technology, Anhui University, Yi Xu School of Computer Science and Technology, Anhui University, Xiao Liu School of Information Technology, Deakin University, Jia Xu School of Computer Science and Technology, Anhui University, Tianxiang Chen School of Computer Science and Technology, Anhui University, Bowen Zhou School of Computer Science and Technology, Anhui University, Rui Li School of Information Technology, Deakin University, Xuejun Li School of Computer Science and Technology, Anhui University
10:50
5m
Poster
Towards Immersive Comprehension of Software Systems Using Augmented Reality - An Empirical Evaluation
Late Breaking Results
Rohit Mehra Accenture Labs, India, Vibhu Saujanya Sharma Accenture Labs, Bangalore, India, Vikrant Kaulgud Accenture Labs, India, Sanjay Podder Accenture, Adam P. Burden Accenture
10:55
5m
Poster
Towards Programming and Verification for Activity-Oriented Smart Home Systems
Late Breaking Results
Xuansong Li School of Computer Science and Engineering, Nanjing University of Science and Technology, Wei Song School of Computer Science and Engineering, Nanjing University of Science and Technology, Xiangyu Zhang Purdue University, USA
11:00
5m
Talk
Towards Robust Production Machine Learning Systems: Managing Dataset Shift
Doctoral Symposium
Hala Abdelkader Applied Artificial Intelligence Institute, Deakin University
11:05
5m
Talk
Using Defect Prediction to Improve the Bug Detection Capability of Search-Based Software Testing
Doctoral Symposium
Anjana Perera Monash University
DOI Pre-print