Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Roee Hay is active.

Publication


Featured researches published by Roee Hay.


international symposium on software testing and analysis | 2015

Dynamic detection of inter-application communication vulnerabilities in Android

Roee Hay; Omer Tripp; Marco Pistoia

A main aspect of the Android platform is Inter-Application Communication (IAC), which enables reuse of functionality across apps and app components via message passing. While a powerful feature, IAC also constitutes a serious attack surface. A malicious app can embed a payload into an IAC message, thereby driving the recipient app into a potentially vulnerable behavior if the message is processed without its fields first being sanitized or validated. We present what to our knowledge is the first comprehensive testing algorithm for Android IAC vulnerabilities. Toward this end, we first describe a catalog, stemming from our field experience, of 8 concrete vulnerability types that can potentially arise due to unsafe handling of incoming IAC messages. We then explain the main challenges that automated discovery of Android IAC vulnerabilities entails, including in particular path coverage and custom data fields, and present simple yet surprisingly effective solutions to these challenges. We have realized our testing approach as the IntentDroid system, which is available as a commercial cloud service. IntentDroid utilizes lightweight platform-level instrumentation, implemented via debug breakpoints (to run atop any Android device without any setup or customization), to recover IAC-relevant app-level behaviors. Evaluation of IntentDroid over a set of 80 top-popular apps has revealed a total 150 IAC vulnerabilities — some already fixed by the developers following our report — with a recall rate of 92% w.r.t. a ground truth established via manual auditing by a security expert.


Archive | 2011

Pinpointing security vulnerabilities in computer software applications

Yair Amit; Roee Hay; Roi Saltzman; Adi Sharabani


Archive | 2009

Identifying security breaches caused by web-enabled software applications

Yair Amit; Roee Hay; Adi Sharabani


Archive | 2010

INJECTION CONTEXT BASED STATIC ANALYSIS OF COMPUTER SOFTWARE APPLICATIONS

Yinnon A. Haviv; Roee Hay; Marco Pistoia; Ory Segal; Adi Sharabani; Takaaki Tateishi; Omer Tripp; Omri Weisman


Archive | 2009

IDENTIFYING SECURITY VULNERABILITY IN COMPUTER SOFTWARE

Yinnon A. Haviv; Roee Hay; Marco Pistoia; Adi Sharabani; Takaaki Tateishi; Omer Tripp; Omri Weisman


Archive | 2009

Protection against cache poisoning

Roee Hay; Adi Sharabani


Archive | 2009

Eliminating False Reports of Security Vulnerabilities when Testing Computer Software

Yinnon A. Haviv; Roee Hay; Marco Pistoia; Adi Sharabani; Takaaki Tateishi; Omer Tripp; Omri Weisman


WOOT'15 Proceedings of the 9th USENIX Conference on Offensive Technologies | 2015

One class to rule them all 0-day deserialization vulnerabilities in android

Or Peles; Roee Hay


Archive | 2012

Simulating black box test results using information from white box testing

Stephen J. Fink; Yinnon A. Haviv; Roee Hay; Marco Pistoia; Ory Segal; Adi Sharabani; Manu Sridharan; Frank Tip; Omer Tripp; Omri Weisman


Archive | 2010

Verification of Information-Flow Downgraders

Yinnon A. Haviv; Roee Hay; Marco Pistoia; Adi Sharabani; Takaaki Tateishi; Omer Tripp; Omri Weisman

Researchain Logo
Decentralizing Knowledge