A partire dal 27 marzo 2025, ti consigliamo di utilizzare android-latest-release
anziché aosp-main
per compilare e contribuire ad AOSP. Per ulteriori informazioni, vedi Modifiche ad AOSP.
ASPIRARE
Mantieni tutto organizzato con le raccolte
Salva e classifica i contenuti in base alle tue preferenze.
Il programma Android Security and Privacy Research (ASPIRE) fornisce finanziamenti per alcune ricerche relative ad Android.
ASPIRE affronta le sfide fondamentali attraverso la lente della praticità e incoraggia lo sviluppo di tecnologie che potrebbero diventare le funzionalità principali di Android in futuro, influenzando l'ecosistema Android nei prossimi 2-5 anni. Questo lasso di tempo si estende oltre la prossima versione annuale di Android per consentire un tempo adeguato per analizzare, sviluppare e stabilizzare la ricerca sulle funzionalità prima di includerle nella piattaforma. Tieni presente che questo è diverso da altre iniziative di sicurezza Android come il programma di divulgazione delle vulnerabilità .
ASPIRE opera invitando proposte per argomenti di ricerca, fornendo finanziamenti per proposte selezionate e collaborando con ricercatori esterni e Googler. Annunciamo un invito a presentare proposte una volta all'anno, in genere a metà anno, e annunciamo le proposte selezionate per il finanziamento entro la fine dell'anno solare.
Oltre ad ASPIRE, se sei un ricercatore interessato a superare i limiti della sicurezza e della privacy di Android, ci sono diversi modi per partecipare:
- Candidati per uno stage di ricerca come studente che persegue una laurea avanzata.
- Candidati per diventare Visiting Researcher presso Google.
- Pubblicazioni in collaborazione con i membri del team Android.
- Collabora con i membri del team Android per apportare modifiche al progetto Android Open Source.
Pubblicazioni finanziate da ASPIRE
2024
- 50 sfumature di supporto: un'analisi incentrata sul dispositivo degli aggiornamenti di sicurezza Android. Abbas Acar, Güliz Seray Tuncay , Esteban Luques, Harun Oz, Ahmet Aris e Selcuk Uluagac. Sicurezza dei sistemi distribuiti e in rete (NDSS) 2024. [ articolo ] [ video ]
- Indossare i miei dati? Comprensione del modello di autorizzazione runtime tra dispositivi nei dispositivi indossabili. Doguhan Yeke, Muhammad Ibrahim, Güliz Seray Tuncay , Habiba Farrukh, Abdullah Imran, Antonio Bianchi e Z. Berkay Celik. Simposio IEEE su sicurezza e privacy (S&P) 2024. [ documento]
- (In)Sicurezza dei caricamenti di file in Node.js. Harun Oz, Abbas Acar, Ahmet Aris, Güliz Seray Tuncay , Amin Kharraz, Selcuk Uluagac. ACM Web Conference (WWW) 2024. [ articolo ]
2023
- RøB: ransomware sui browser Web moderni . Oz, Harun, Ahmet Aris, Abbas Acar, Güliz Seray Tuncay , Leonardo Babun e Selcuk Uluagac. Simposio sulla sicurezza USENIX (USENIX Security) 2023. [ articolo ] [ video ] [ diapositive ]
- UE Security Reloaded: sviluppo di un framework di test di sicurezza lato utente autonomo per il 5G . E Bitsikas, S Khandker, A Salous, A Ranganathan, R Piqueras Jover, C Pöpper. Conferenza ACM sulla sicurezza e la privacy nelle reti wireless e mobili (WiSec) 2023. [ articolo ] [ video ] [ diapositive ]
- Il manuale sul malware per Android. Qian Han, Salvador Mandujano, Sebastian Porst, VS Subrahmanian, Sai Deep Tetali. [ libro ]
- Comprendere i pattern oscuri nei dispositivi IoT domestici . Monica Kowalczyk, Johanna T. Gunawan, David Choffnes, Daniel J Dubois, Woodrow Hartzog, Christo Wilson. Conferenza ACM sui fattori umani nei sistemi informatici (CHI) 2023. [ articolo ]
- Apprendimento continuo per il rilevamento malware Android . Yizheng Chen, Zhoujie Ding e David Wagner. Simposio sulla sicurezza USENIX (USENIX Security) 2023. [ articolo ]
- PolyScope: analisi del controllo degli accessi multi-policy per il triage dello storage con ambito Android . Yu-Tsung Lee, Haining Chen, William Enck, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Giuseppe Petracca e Trent Jaeger. IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2023.3310402. [ carta ]
- Triaging dei sistemi Android utilizzando grafici di attacco bayesiani. Yu-Tsung Lee, Rahul George, Haining Chen, Kevin Chan e Trent Jaeger. Conferenza IEEE Secure Development (SecDev), 2023. [ documento ]
2022
- SARA: Autorizzazione remota Android sicura . Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik e Antonio Bianchi. Simposio sulla sicurezza USENIX (USENIX Security) 2022. [ articolo ] [ video ] [ diapositive ]
- FReD: identificazione della ridelega dei file nei servizi di sistema Android. Sigmund Albert Gorski III, Seaver Thorn, William Enck e Haining Chen. Simposio sulla sicurezza USENIX (USENIX Security) 2022. [ articolo ] [ video ] [ diapositive ]
- Poirot: raccomandare probabilisticamente protezioni per il framework Android. Zeinab El-Rewini, Zhuo Zhang, Yousra Aafer. ACM Computer and Communication Security (CCS) 2022. [ articolo ]
- Sifter: protezione dei moduli kernel critici per la sicurezza in Android attraverso la riduzione della superficie di attacco. Hsin-Wei Hung, Yingtong Liu, Ardalan Amiri Sani. Conferenza ACM sul mobile computing e sulle reti (MobiCom) 2022. [ articolo ]
2021
- Un'indagine sull'ecosistema delle patch del kernel Android. Zheng Zhang, Hang Zhang, Zhiyun Qian e Billy Lau. Simposio sulla sicurezza USENIX (USENIX Security) 2021. [ articolo ] [ video ] [ diapositive ]
- Demistificazione della difesa dello storage con ambito di Android. Yu-Tsung Lee, Haining Chen e Trent Jaeger. Sicurezza e privacy IEEE, vol. 19, n. 05, pp. 16-25, 2021. [ cartaceo ]
2019
- Proteggere lo stack con i canarini PACed. H. Liljestrand, Z. Gauhar, T. Nyman, J.-E. Ekberg e N. Asokan. [ carta ]
I campioni di contenuti e codice in questa pagina sono soggetti alle licenze descritte nella Licenza per i contenuti. Java e OpenJDK sono marchi o marchi registrati di Oracle e/o delle sue società consociate.
Ultimo aggiornamento 2024-04-29 UTC.
[[["Facile da capire","easyToUnderstand","thumb-up"],["Il problema è stato risolto","solvedMyProblem","thumb-up"],["Altra","otherUp","thumb-up"]],[["Mancano le informazioni di cui ho bisogno","missingTheInformationINeed","thumb-down"],["Troppo complicato/troppi passaggi","tooComplicatedTooManySteps","thumb-down"],["Obsoleti","outOfDate","thumb-down"],["Problema di traduzione","translationIssue","thumb-down"],["Problema relativo a esempi/codice","samplesCodeIssue","thumb-down"],["Altra","otherDown","thumb-down"]],["Ultimo aggiornamento 2024-04-29 UTC."],[],[],null,["# ASPIRE\n\nThe Android Security and Privacy Research (ASPIRE) program provides\nfunding for certain research related to Android.\n\nASPIRE tackles fundamental challenges through the lens of practicality and\nencourages the development of technologies that may become core Android features\nin the future, impacting the Android ecosystem in the next 2-5 years. This\ntimeframe extends beyond the next annual Android release to allow adequate time\nto analyze, develop, and stabilize research into features before including in\nthe platform. Note that this is distinct from other Android security initiatives\nsuch as the [vulnerability\ndisclosure program](https://bughunters.google.com/about).\n\nASPIRE operates by inviting proposals for research topics, providing funding\nfor select proposals, and partnering external researchers with Googlers. We\nannounce a call for proposals once a year, typically in the middle of the year,\nand announce the proposals selected for funding by the end of the calendar\nyear.\n\nBeyond ASPIRE, if you're a researcher interested in pushing the boundaries of\nAndroid security and privacy, there are several ways to participate:\n\n- Apply for a [research\n internship](https://careers.google.com/students/engineering-and-technical-internships/) as a student pursuing an advanced degree.\n- Apply to become a [Visiting\n Researcher](https://research.google/outreach/visiting-researcher-program/) at Google.\n- Co-author publications with Android team members.\n- Collaborate with Android team members to make changes to the Android Open Source Project.\n\n### Publications funded by ASPIRE\n\n#### 2025\n\n- **ScopeVerif: Analyzing the Security of Android's\n Scoped Storage via Differential Analysis** Zeyu Lei, [Güliz Seray\n Tuncay](https://research.google/people/g%C3%BCliz-seray-tuncay/), Beatrice Carissa Williem, Z. Berkay Celik, and Antonio Bianchi. Purdue University, Google 2025 \\[[paper](https://www.ndss-symposium.org/wp-content/uploads/2025-340-paper.pdf)\\]\n\n\u003c!-- --\u003e\n\n- **LANShield: Analysing and Protecting Local Network Access on Mobile Devices.** Angelos Beitis, Jeroen Robben, Alexander Matern, Zhen Lei, Yijia Li, Nian Xue, Yongle Chen, Vik Vanderlinden, and Mathy Vanhoef. 25th Privacy Enhancing Technologies Symposium (PETS) 2025. \\[[paper](https://papers.mathyvanhoef.com/pets2025.pdf)\\] \\[[website](https://lanshield.eu)\\]\n\n#### 2024\n\n- **SIMurai: Slicing Through the Complexity of SIM Card Security Research** Tomasz Piotr Lisowski, Merlin Chlosta, Jinjin Wang, and Marius Muench. 33rd USENIX Security Symposium. \\[[paper](https://www.usenix.org/system/files/usenixsecurity24-lisowski.pdf)\\] \\[[video](https://www.youtube.com/watch?v=3_R9P--ksE4)\\] \\[[slides](https://www.usenix.org/system/files/usenixsecurity24_slides-lisowski.pdf)\\]\n- **50 Shades of Support: A Device-Centric Analysis of Android\n Security Updates.** Abbas Acar, [Güliz Seray\n Tuncay](https://research.google/people/g%C3%BCliz-seray-tuncay/), Esteban Luques, Harun Oz, Ahmet Aris, and Selcuk Uluagac. Networked and Distributed Systems Security (NDSS) 2024. \\[[paper](https://www.ndss-symposium.org/wp-content/uploads/2024-175-paper.pdf)\\] \\[[video](https://www.youtube.com/watch?v=s_CIxz1BLEM)\\]\n- **Wear's my Data? Understanding the Cross-Device Runtime Permission\n Model in Wearables.** Doguhan Yeke, Muhammad Ibrahim, [Güliz SerayP\n Tuncay](https://research.google/people/g%C3%BCliz-seray-tuncay/), Habiba Farrukh, Abdullah Imran, Antonio Bianchi, and Z. Berkay Celik. IEEE Symposium on Security and Privacy (S\\&P) 2024. \\[[paper\\]](https://www.computer.org/csdl/proceedings-article/sp/2024/313000a077/1RjEaMvw3iE) \\[[video](https://www.youtube.com/watch?v=EWrEsDJ084c)\\]\n- **(In)Security of File Uploads in Node.js.** Harun Oz, Abbas Acar, Ahmet Aris, [Güliz Seray\n Tuncay](https://research.google/people/g%C3%BCliz-seray-tuncay/), Amin Kharraz, Selcuk Uluagac. ACM Web Conference (WWW) 2024. \\[[paper](https://research.google/pubs/pub53215/)\\]\n\n#### 2023\n\n- **RøB: Ransomware over Modern Web Browsers** . Oz, Harun, Ahmet Aris, Abbas Acar, [Güliz Seray\n Tuncay](https://research.google/people/g%C3%BCliz-seray-tuncay/), Leonardo Babun, and Selcuk Uluagac. USENIX Security Symposium (USENIX Security) 2023. \\[[paper](https://www.usenix.org/system/files/usenixsecurity23-oz.pdf)\\] \\[[video](https://youtu.be/MUVNz6p3_jk)\\] \\[[slides](https://www.usenix.org/system/files/sec23_slides_oz.pdf)\\]\n- **UE Security Reloaded: Developing a 5G Standalone User-Side Security\n Testing Framework** . E Bitsikas, S Khandker, A Salous, A Ranganathan, R Piqueras Jover, C Pöpper. ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) 2023. \\[[paper](https://dl.acm.org/doi/abs/10.1145/3558482.3590194)\\] \\[[video](https://www.youtube.com/watch?v=GrJCN-_T29c&list=PL4FCce8hBdnIf2argwcrw5J0h_eB39WSn&index=15)\\] \\[slides\\]\n- **The Android Malware Handbook.** Qian Han, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Sai Deep Tetali. \\[[book](https://books.google.com/books/about/The_Android_Malware_Handbook.html?id=U2y1EAAAQBAJ)\\]\n- **Understanding Dark Patterns in Home IoT Devices** . Monica Kowalczyk, Johanna T. Gunawan, David Choffnes, Daniel J Dubois, Woodrow Hartzog, Christo Wilson. ACM Conference on Human Factors in Computing Systems (CHI) 2023. \\[[paper](https://david.choffnes.com/pubs/chi23-740-2.pdf)\\]\n- **Continuous Learning for Android Malware Detection** . Yizheng Chen, Zhoujie Ding, and David Wagner. USENIX Security Symposium (USENIX Security) 2023. \\[[paper](https://www.usenix.org/system/files/usenixsecurity23-chen-yizheng.pdf)\\]\n- **PolyScope: Multi-Policy Access Control Analysis to Triage Android\n Scoped Storage** . Yu-Tsung Lee, Haining Chen, William Enck, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Giuseppe Petracca, and Trent Jaeger. IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2023.3310402. \\[[paper](https://ieeexplore.ieee.org/abstract/document/10234635)\\]\n- **Triaging Android Systems Using Bayesian Attack Graphs.** Yu-Tsung Lee, Rahul George, Haining Chen, Kevin Chan, and Trent Jaeger. IEEE Secure Development Conference (SecDev), 2023. \\[[paper](https://ieeexplore.ieee.org/abstract/document/10305618)\\]\n\n#### 2022\n\n- **SARA: Secure Android Remote Authorization** . Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, and Antonio Bianchi. USENIX Security Symposium (USENIX Security) 2022. \\[[paper](https://www.usenix.org/system/files/sec22-imran.pdf)\\] \\[[video](https://youtu.be/gvYUctgJ3P8)\\] \\[[slides](https://www.usenix.org/system/files/sec22_slides-imran.pdf)\\]\n- **FReD: Identifying File Re-Delegation in Android System\n Services.** Sigmund Albert Gorski III, Seaver Thorn, William Enck, and Haining Chen. USENIX Security Symposium (USENIX Security) 2022. \\[[paper](https://www.usenix.org/system/files/sec22summer_gorski.pdf)\\] \\[[video](https://www.youtube.com/watch?v=xtv1-51W2o8)\\] \\[[slides](https://www.usenix.org/system/files/sec22_slides-gorski.pdf)\\]\n- **Poirot: Probabilistically Recommending Protections for the Android\n Framework.** Zeinab El-Rewini, Zhuo Zhang, Yousra Aafer. ACM Computer and Communication Security (CCS) 2022. \\[[paper](https://dl.acm.org/doi/pdf/10.1145/3548606.3560710)\\]\n- **Sifter: Protecting Security-Critical Kernel Modules in Android\n through Attack Surface Reduction.** Hsin-Wei Hung, Yingtong Liu, Ardalan Amiri Sani. ACM Conference on Mobile Computing And Networking (MobiCom) 2022. \\[[paper](https://dl.acm.org/doi/pdf/10.1145/3495243.3560548)\\]\n\n#### 2021\n\n- **An Investigation of the Android Kernel Patch\n Ecosystem.** Zheng Zhang, Hang Zhang, Zhiyun Qian, and Billy Lau. USENIX Security Symposium (USENIX Security) 2021. \\[[paper](https://www.usenix.org/system/files/sec21-zhang-zheng.pdf)\\] \\[[video](https://www.youtube.com/watch?v=sx2unUrsQhc)\\] \\[[slides](https://www.usenix.org/system/files/sec21_slides_zhang-zheng.pdf)\\]\n- **Demystifying Android's Scoped Storage Defense.** Yu-Tsung Lee, Haining Chen, and Trent Jaeger. IEEE Security \\& Privacy, vol. 19, no. 05, pp. 16-25, 2021. \\[[paper](https://ieeexplore.ieee.org/abstract/document/9502925)\\]\n\n#### 2019\n\n- **Protecting the stack with PACed canaries.** H. Liljestrand, Z. Gauhar, T. Nyman, J.-E. Ekberg, and N. Asokan. \\[[paper](https://dl.acm.org/doi/pdf/10.1145/3342559.3365336)\\]"]]