Static analysis of android apps: A systematic literature review
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …
often traversing program paths to check some program properties. Static analysis …
A multimodal deep learning method for android malware detection using various features
With the widespread use of smartphones, the number of malware has been increasing
exponentially. Among smart devices, android devices are the most targeted devices by …
exponentially. Among smart devices, android devices are the most targeted devices by …
Toward engineering a secure android ecosystem: A survey of existing techniques
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …
Droidcat: Effective android malware detection and categorization via app-level profiling
Most existing Android malware detection and categorization techniques are static
approaches, which suffer from evasion attacks, such as obfuscation. By analyzing program …
approaches, which suffer from evasion attacks, such as obfuscation. By analyzing program …
A performance-sensitive malware detection system using deep learning on mobile devices
Currently, Android malware detection is mostly performed on server side against the
increasing number of malware. Powerful computing resource provides more exhaustive …
increasing number of malware. Powerful computing resource provides more exhaustive …
Taintart: A practical multi-level information-flow tracking system for android runtime
Mobile operating systems like Android failed to provide sufficient protection on personal
data, and privacy leakage becomes a major concern. To understand the security risks and …
data, and privacy leakage becomes a major concern. To understand the security risks and …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
How developers talk about personal data and what it means for user privacy: A case study of a developer forum on reddit
While online developer forums are major resources of knowledge for application
developers, their roles in promoting better privacy practices remain underexplored. In this …
developers, their roles in promoting better privacy practices remain underexplored. In this …
Collusive data leak and more: Large-scale threat analysis of inter-app communications
Inter-Component Communication (ICC) provides a message passing mechanism for data
exchange between Android applications. It has been long believed that inter-app ICCs can …
exchange between Android applications. It has been long believed that inter-app ICCs can …
Static window transition graphs for Android
This work develops a static analysis to create a model of the behavior of an Android
application's GUI. We propose the window transition graph (WTG), a model representing the …
application's GUI. We propose the window transition graph (WTG), a model representing the …