Android inter-app communication threats and detection techniques
With the digital breakthrough, smart phones have become very essential component for
many routine tasks like shop**, paying bills, transferring money, instant messaging …
many routine tasks like shop**, paying bills, transferring money, instant messaging …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
Future trends in software engineering research for mobile apps
There has been tremendous growth in the use of mobile devices over the last few years.
This growth has fueled the development of millions of software applications for these mobile …
This growth has fueled the development of millions of software applications for these mobile …
An empirical study on android-related vulnerabilities
Mobile devices are used more and more in everyday life. They are our cameras, wallets, and
keys. Basically, they embed most of our private information in our pocket. For this and other …
keys. Basically, they embed most of our private information in our pocket. For this and other …
Android malware detection using complex-flows
This paper proposes a new technique to detect mobile malware based on information flow
analysis. Our approach examines the structure of information flows to identify patterns of …
analysis. Our approach examines the structure of information flows to identify patterns of …
An adaptive and configurable protection framework against android privilege escalation threats
Android is a successful mobile platform with a thriving application ecosystem. However,
despite its security precautions like permission mechanism, it is still vulnerable to privilege …
despite its security precautions like permission mechanism, it is still vulnerable to privilege …
Ghera: A repository of android app vulnerability benchmarks
Security of mobile apps affects the security of their users. This has fueled the development of
techniques to automatically detect vulnerabilities in mobile apps and help developers …
techniques to automatically detect vulnerabilities in mobile apps and help developers …
Identifying mobile inter-app communication risks
Malware collusion is a technique utilized by attackers to evade standard detection. It is a
new threat where two or more applications, appearing benign, communicate to perform a …
new threat where two or more applications, appearing benign, communicate to perform a …
Dina: Detecting hidden android inter-app communication in dynamic loaded code
Android inter-app communication (IAC) allows apps to request functionalities from other
apps, which has been extensively used to provide a better user experience. However, IAC …
apps, which has been extensively used to provide a better user experience. However, IAC …
The Android OS stack and its vulnerabilities: an empirical study
A Mazuera-Rozo, J Bautista-Mora… - Empirical Software …, 2019 - Springer
The wide and rapid adoption of Android-based devices in the last years has motivated the
usage of Android apps to support a broad range of daily activities. In that sense, being the …
usage of Android apps to support a broad range of daily activities. In that sense, being the …