Skip to main content

Showing 1–14 of 14 results for author: Bartel, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.15031  [pdf

    cs.CV

    Nuclear Pleomorphism in Canine Cutaneous Mast Cell Tumors: Comparison of Reproducibility and Prognostic Relevance between Estimates, Manual Morphometry and Algorithmic Morphometry

    Authors: Andreas Haghofer, Eda Parlak, Alexander Bartel, Taryn A. Donovan, Charles-Antoine Assenmacher, Pompei Bolfa, Michael J. Dark, Andrea Fuchs-Baumgartinger, Andrea Klang, Kathrin Jäger, Robert Klopfleisch, Sophie Merz, Barbara Richter, F. Yvonne Schulman, Hannah Janout, Jonathan Ganz, Josef Scharinger, Marc Aubreville, Stephan M. Winkler, Matti Kiupel, Christof A. Bertram

    Abstract: Variation in nuclear size and shape is an important criterion of malignancy for many tumor types; however, categorical estimates by pathologists have poor reproducibility. Measurements of nuclear characteristics (morphometry) can improve reproducibility, but manual methods are time consuming. The aim of this study was to explore the limitations of estimates and develop alternative morphometric sol… ▽ More

    Submitted 23 May, 2024; v1 submitted 26 September, 2023; originally announced September 2023.

  2. arXiv:2208.08173  [pdf, other

    cs.CR cs.SE

    An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities

    Authors: Imen Sayar, Alexandre Bartel, Eric Bodden, Yves Le Traon

    Abstract: Nowadays, an increasing number of applications uses deserialization. This technique, based on rebuilding the instance of objects from serialized byte streams, can be dangerous since it can open the application to attacks such as remote code execution (RCE) if the data to deserialize is originating from an untrusted source. Deserialization vulnerabilities are so critical that they are in OWASP's li… ▽ More

    Submitted 17 August, 2022; originally announced August 2022.

    Comments: ACM Transactions on Software Engineering and Methodology, Association for Computing Machinery, 2022

  3. arXiv:2108.10381  [pdf, other

    cs.CR cs.SE

    On The (In)Effectiveness of Static Logic Bomb Detector for Android Apps

    Authors: Jordan Samhi, Alexandre Bartel

    Abstract: Android is present in more than 85% of mobile devices, making it a prime target for malware. Malicious code is becoming increasingly sophisticated and relies on logic bombs to hide itself from dynamic analysis. In this paper, we perform a large scale study of TSOPEN, our open-source implementation of the state-of-the-art static logic bomb scanner TRIGGERSCOPE, on more than 500k Android application… ▽ More

    Submitted 25 August, 2021; v1 submitted 23 August, 2021; originally announced August 2021.

  4. arXiv:2012.09916  [pdf, other

    cs.SE

    RAICC: Revealing Atypical Inter-Component Communication in Android Apps

    Authors: Jordan Samhi, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: Inter-Component Communication (ICC) is a key mechanism in Android. It enables developers to compose rich functionalities and explore reuse within and across apps. Unfortunately, as reported by a large body of literature, ICC is rather "complex and largely unconstrained", leaving room to a lack of precision in apps modeling. To address the challenge of tracking ICCs within apps, state of the art st… ▽ More

    Submitted 15 January, 2021; v1 submitted 17 December, 2020; originally announced December 2020.

    Comments: In the proceedings of the 43rd International Conference on Software Engineering 2021 (ICSE 2021)

  5. How Many Annotators Do We Need? -- A Study on the Influence of Inter-Observer Variability on the Reliability of Automatic Mitotic Figure Assessment

    Authors: Frauke Wilm, Christof A. Bertram, Christian Marzahl, Alexander Bartel, Taryn A. Donovan, Charles-Antoine Assenmacher, Kathrin Becker, Mark Bennett, Sarah Corner, Brieuc Cossic, Daniela Denk, Martina Dettwiler, Beatriz Garcia Gonzalez, Corinne Gurtner, Annika Lehmbecker, Sophie Merz, Stephanie Plog, Anja Schmidt, Rebecca C. Smedley, Marco Tecilla, Tuddow Thaiwong, Katharina Breininger, Matti Kiupel, Andreas Maier, Robert Klopfleisch , et al. (1 additional authors not shown)

    Abstract: Density of mitotic figures in histologic sections is a prognostically relevant characteristic for many tumours. Due to high inter-pathologist variability, deep learning-based algorithms are a promising solution to improve tumour prognostication. Pathologists are the gold standard for database development, however, labelling errors may hamper development of accurate algorithms. In the present work… ▽ More

    Submitted 8 January, 2021; v1 submitted 4 December, 2020; originally announced December 2020.

    Comments: Due to data inconsistencies experiments had to be repeated with a reduced number of annotators (17 in version 1). All findings of the previous version were reproducible. 7 pages, 2 figures, accepted at BVM workshop 2021

  6. arXiv:1901.03603  [pdf, other

    cs.CR

    ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware

    Authors: Sigmund Albert Gorski III, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck, Eric Bodden, Alexandre Bartel

    Abstract: Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android's permission model is well studied, the enforcement of the protection policy has received relatively little attention. Much of this enforcement is spread across system services, taking the form of hard-coded checks within their implementations.… ▽ More

    Submitted 11 January, 2019; originally announced January 2019.

  7. arXiv:1709.05281  [pdf, other

    cs.SE

    AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community

    Authors: Li Li, Jun Gao, Médéric Hurier, **fan Kong, Tegawendé F. Bissyandé, Alexandre Bartel, Jacques Klein, Yves Le Traon

    Abstract: We present a growing collection of Android apps collected from several sources, including the official Google Play app market and a growing collection of various metadata of those collected apps aiming at facilitating the Android-relevant research works. Our dataset by far has collected over five million apps and over 20 types of metadata such as VirusTotal reports. Our objective of collecting thi… ▽ More

    Submitted 15 September, 2017; originally announced September 2017.

  8. arXiv:1605.08159  [pdf, ps, other

    cs.SE cs.CR

    Analyzing the Gadgets Towards a Metric to Measure Gadget Quality

    Authors: Andreas Follner, Alexandre Bartel, Eric Bodden

    Abstract: Current low-level exploits often rely on code-reuse, whereby short sections of code (gadgets) are chained together into a coherent exploit that can be executed without the need to inject any code. Several protection mechanisms attempt to eliminate this attack vector by applying code transformations to reduce the number of available gadgets. Nevertheless, it has emerged that the residual gadgets ca… ▽ More

    Submitted 26 May, 2016; originally announced May 2016.

    Comments: International Symposium on Engineering Secure Software and Systems, Apr 2016, London, United Kingdom

  9. Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android

    Authors: Alexandre Bartel, Jacques Klein, Martin Monperrus, Yves Le Traon

    Abstract: A common security architecture is based on the protection of certain resources by permission checks (used e.g., in Android and Blackberry). It has some limitations, for instance, when applications are granted more permissions than they actually need, which facilitates all kinds of malicious usage (e.g., through code injection). The analysis of permission-based framework requires a precise map**… ▽ More

    Submitted 18 August, 2014; originally announced August 2014.

    Comments: IEEE Transactions on Software Engineering (2014). arXiv admin note: substantial text overlap with arXiv:1206.5829

    Journal ref: IEEE Transactions on Software Engineering, 2014

  10. arXiv:1404.7431  [pdf, ps, other

    cs.SE cs.CR

    I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis

    Authors: Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick McDaniel

    Abstract: Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-component data-flow analysis to detect privacy leaks between components of Android applications. Unlike all current approaches, our tool, called IccTA, propagates the context between the components, which improves the precision of the analysis. IccTA outperforms all other available tools by reaching… ▽ More

    Submitted 29 April, 2014; originally announced April 2014.

    Report number: 978-2-87971-129-4_TR-SNT-2014-9 ACM Class: D.2.4; D.4.6

  11. arXiv:1208.4536  [pdf, ps, other

    cs.CR cs.SE

    In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments

    Authors: Alexandre Bartel, Jacques Klein, Martin Monperrus, Kevin Allix, Yves Le Traon

    Abstract: In this paper we claim that an efficient and readily applicable means to improve privacy of Android applications is: 1) to perform runtime monitoring by instrumenting the application bytecode and 2) in-vivo, i.e. directly on the smartphone. We present a tool chain to do this and present experimental results showing that this tool chain can run on smartphones in a reasonable amount of time and with… ▽ More

    Submitted 8 October, 2013; v1 submitted 5 June, 2012; originally announced August 2012.

    Comments: ISBN: 978-2-87971-111-9

  12. arXiv:1206.5829  [pdf, ps, other

    cs.CR cs.SE

    Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android

    Authors: Alexandre Bartel, Jacques Klein, Martin Monperrus, Yves Le Traon

    Abstract: A common security architecture, called the permission-based security model (used e.g. in Android and Blackberry), entails intrinsic risks. For instance, applications can be granted more permissions than they actually need, what we call a "permission gap". Malware can leverage the unused permissions for achieving their malicious goals, for instance using code injection. In this paper, we present an… ▽ More

    Submitted 20 March, 2013; v1 submitted 22 May, 2012; originally announced June 2012.

    Report number: ISBN: 978-2-87971-107-2

  13. arXiv:1205.5783  [pdf, other

    cs.SE

    Model Driven Mutation Applied to Adaptative Systems Testing

    Authors: Alexandre Bartel, Benoit Baudry, Freddy Munoz, Jacques Klein, Tejeddine Mouelhi, Yves Le Traon

    Abstract: Dynamically Adaptive Systems modify their behav- ior and structure in response to changes in their surrounding environment and according to an adaptation logic. Critical sys- tems increasingly incorporate dynamic adaptation capabilities; examples include disaster relief and space exploration systems. In this paper, we focus on mutation testing of the adaptation logic. We propose a fault model for… ▽ More

    Submitted 25 May, 2012; originally announced May 2012.

    Comments: IEEE International Conference on Software Testing, Verification and Validation, Mutation Analysis Workshop (Mutation 2011), Berlin : Allemagne (2011)

  14. Dexpler: Converting Android Dalvik Bytecode to Jimple for Static Analysis with Soot

    Authors: Alexandre Bartel, Jacques Klein, Martin Monperrus, Yves Le Traon

    Abstract: This paper introduces Dexpler, a software package which converts Dalvik bytecode to Jimple. Dexpler is built on top of Dedexer and Soot. As Jimple is Soot's main internal rep- resentation of code, the Dalvik bytecode can be manipu- lated with any Jimple based tool, for instance for performing point-to or flow analysis.

    Submitted 31 January, 2013; v1 submitted 16 May, 2012; originally announced May 2012.

    Comments: ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis(SOAP 2012), Bei**g : China (2012)

    Journal ref: ACM SIGPLAN International Workshop on State Of the Art in Java Program Analysis, 2012