Toward engineering a secure android ecosystem: A survey of existing techniques

M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng… - ACM Computing …, 2016 - dl.acm.org
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …

Inferring user routes and locations using zero-permission mobile sensors

S Narain, TD Vo-Huu, K Block… - 2016 IEEE Symposium …, 2016 - ieeexplore.ieee.org
Leakage of user location and traffic patterns is a serious security threat with significant
implications on privacy as reported by recent surveys and identified by the US Congress …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

A study of security isolation techniques

R Shu, P Wang, SA Gorski III, B Andow… - ACM Computing …, 2016 - dl.acm.org
Security isolation is a foundation of computing systems that enables resilience to different
forms of attacks. This article seeks to understand existing security isolation techniques by …

On demystifying the android application framework:{Re-Visiting} android permission specification analysis

M Backes, S Bugiel, E Derr, P McDaniel… - 25th USENIX security …, 2016 - usenix.org
In contrast to the Android application layer, Android's application framework's internals and
their influence on the platform security and user privacy are still largely a black box for us. In …

Sok: Lessons learned from android security research for appified software platforms

Y Acar, M Backes, S Bugiel, S Fahl… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Android security and privacy research has boomed in recent years, far outstrip**
investigations of other appified platforms. However, despite this attention, research efforts …

Malton: Towards {On-Device}{Non-Invasive} Mobile Malware Analysis for {ART}

L Xue, Y Zhou, T Chen, X Luo, G Gu - 26th USENIX Security Symposium …, 2017 - usenix.org
It's an essential step to understand malware's behaviors for develo** effective solutions.
Though a number of systems have been proposed to analyze Android malware, they have …

Secloak: Arm trustzone-based mobile peripheral control

M Lentz, R Sen, P Druschel… - Proceedings of the 16th …, 2018 - dl.acm.org
Reliable on-off control of peripherals on smart devices is a key to security and privacy in
many scenarios. Journalists want to reliably turn off radios to protect their sources during …

Artist: The android runtime instrumentation and security toolkit

M Backes, S Bugiel, O Schranz… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
With the introduction of Android 5 Lollipop, the Android Runtime (ART) superseded the
Dalvik Virtual Machine (DVM) by introducing ahead-of-time compilation and native …