Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

A multimodal deep learning method for android malware detection using various features

TG Kim, BJ Kang, M Rho, S Sezer… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the widespread use of smartphones, the number of malware has been increasing
exponentially. Among smart devices, android devices are the most targeted devices by …

Toward engineering a secure android ecosystem: A survey of existing techniques

M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng… - ACM Computing …, 2016 - dl.acm.org
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …

Droidcat: Effective android malware detection and categorization via app-level profiling

H Cai, N Meng, B Ryder, D Yao - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Most existing Android malware detection and categorization techniques are static
approaches, which suffer from evasion attacks, such as obfuscation. By analyzing program …

A performance-sensitive malware detection system using deep learning on mobile devices

R Feng, S Chen, X **e, G Meng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Currently, Android malware detection is mostly performed on server side against the
increasing number of malware. Powerful computing resource provides more exhaustive …

Taintart: A practical multi-level information-flow tracking system for android runtime

M Sun, T Wei, JCS Lui - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Mobile operating systems like Android failed to provide sufficient protection on personal
data, and privacy leakage becomes a major concern. To understand the security risks and …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

How developers talk about personal data and what it means for user privacy: A case study of a developer forum on reddit

T Li, E Louie, L Dabbish, JI Hong - Proceedings of the ACM on Human …, 2021 - dl.acm.org
While online developer forums are major resources of knowledge for application
developers, their roles in promoting better privacy practices remain underexplored. In this …

Collusive data leak and more: Large-scale threat analysis of inter-app communications

A Bosu, F Liu, D Yao, G Wang - Proceedings of the 2017 ACM on Asia …, 2017 - dl.acm.org
Inter-Component Communication (ICC) provides a message passing mechanism for data
exchange between Android applications. It has been long believed that inter-app ICCs can …

Static window transition graphs for Android

S Yang, H Wu, H Zhang, Y Wang… - Automated Software …, 2018 - Springer
This work develops a static analysis to create a model of the behavior of an Android
application's GUI. We propose the window transition graph (WTG), a model representing the …