Android inter-app communication threats and detection techniques

S Bhandari, WB Jaballah, V Jain, V Laxmi… - Computers & …, 2017 - Elsevier
With the digital breakthrough, smart phones have become very essential component for
many routine tasks like shop**, paying bills, transferring money, instant messaging …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Future trends in software engineering research for mobile apps

M Nagappan, E Shihab - 2016 IEEE 23rd international …, 2016 - ieeexplore.ieee.org
There has been tremendous growth in the use of mobile devices over the last few years.
This growth has fueled the development of millions of software applications for these mobile …

An empirical study on android-related vulnerabilities

M Linares-Vásquez, G Bavota… - 2017 IEEE/ACM 14th …, 2017 - ieeexplore.ieee.org
Mobile devices are used more and more in everyday life. They are our cameras, wallets, and
keys. Basically, they embed most of our private information in our pocket. For this and other …

Android malware detection using complex-flows

F Shen, J Del Vecchio, A Mohaisen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper proposes a new technique to detect mobile malware based on information flow
analysis. Our approach examines the structure of information flows to identify patterns of …

An adaptive and configurable protection framework against android privilege escalation threats

Y Xu, G Wang, J Ren, Y Zhang - Future Generation Computer Systems, 2019 - Elsevier
Android is a successful mobile platform with a thriving application ecosystem. However,
despite its security precautions like permission mechanism, it is still vulnerable to privilege …

Ghera: A repository of android app vulnerability benchmarks

J Mitra, VP Ranganath - … of the 13th international conference on …, 2017 - dl.acm.org
Security of mobile apps affects the security of their users. This has fueled the development of
techniques to automatically detect vulnerabilities in mobile apps and help developers …

Identifying mobile inter-app communication risks

KO Elish, H Cai, D Barton, D Yao… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Malware collusion is a technique utilized by attackers to evade standard detection. It is a
new threat where two or more applications, appearing benign, communicate to perform a …

Dina: Detecting hidden android inter-app communication in dynamic loaded code

M Alhanahnah, Q Yan, H Bagheri… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Android inter-app communication (IAC) allows apps to request functionalities from other
apps, which has been extensively used to provide a better user experience. However, IAC …

The Android OS stack and its vulnerabilities: an empirical study

A Mazuera-Rozo, J Bautista-Mora… - Empirical Software …, 2019 - Springer
The wide and rapid adoption of Android-based devices in the last years has motivated the
usage of Android apps to support a broad range of daily activities. In that sense, being the …