Malicious application detection in android—a systematic literature review

T Sharma, D Rattan - Computer Science Review, 2021 - Elsevier
Context: In last decade, due to tremendous usage of smart phones it seems that these
gadgets became an essential necessity of day-to-day life. People are using new …

Comprehensive review and analysis of anti-malware apps for smartphones

M Talal, AA Zaidan, BB Zaidan, OS Albahri… - Telecommunication …, 2019 - Springer
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …

[HTML][HTML] Automated repair of resource leaks in Android applications

BN Bhatt, CA Furia - Journal of Systems and Software, 2022 - Elsevier
Resource leaks–a program does not release resources it previously acquired–are a
common kind of bug in Android applications. Even with the help of existing techniques to …

Interactive visualization toolbox to detect sophisticated android malware

GR Santhanam, B Holland, S Kothari… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
Detecting zero-day sophisticated malware is like searching for a needle in the haystack, not
knowing what the needle looks like. This paper describes Android Malicious Flow …

On the threat of metastability in an asynchronous fault-tolerant clock generation scheme

G Fuchs, M Függer, A Steininger - 2009 15th IEEE Symposium …, 2009 - ieeexplore.ieee.org
Due to their handshake-based flow control, asynchronous circuits generally do not suffer
from metastability issues as much as synchronous circuits do. We will show, however, that …

Effect-driven flow analysis

J Nicolay, Q Stiévenart, W De Meuter… - … , Model Checking, and …, 2019 - Springer
Traditional machine-based static analyses use a worklist algorithm to explore the analysis
state space, and compare each state in the worklist against a set of seen states as part of …

Defending android applications availability

S Schmeelk, A Aho - 2017 IEEE 28th Annual Software …, 2017 - ieeexplore.ieee.org
There are over a billion devices running the Android operating system. It is being used
globally in personal, public, private and government organizations. Device and application …

Permission-based analysis of android applications using categorization and deep learning scheme

A Hamidreza, N Mohammed - MATEC Web of Conferences, 2019 - matec-conferences.org
As mobile devices grow in popularity, they have become indispensable in people's daily
lives, kee** us connected to social networks, breaking news, and the entire Internet. While …

From mobile to security

J Hoffmann - 2014 - hss-opus.ub.ruhr-unibochum.de
Im Rahmen dieser Dissertation nehmen wir uns einige der Probleme im Forschungsthema"
Mobile Sicherheit" an. Wir stellen zunächst das Forschungsfeld vor und verdeutlichen, dass …

Pruning, pushdown exception-flow analysis

S Liang, W Sun, M Might, A Keep… - 2014 IEEE 14th …, 2014 - ieeexplore.ieee.org
Statically reasoning in the presence of exceptions and about the effects of exceptions is
challenging: exception-flows are mutually determined by traditional control-flow and points …