On the impact of sample duplication in machine-learning-based android malware detection

Y Zhao, L Li, H Wang, H Cai, TF Bissyandé… - ACM Transactions on …, 2021 - dl.acm.org
Malware detection at scale in the Android realm is often carried out using machine learning
techniques. State-of-the-art approaches such as DREBIN and MaMaDroid are reported to …

Peep with a mirror: breaking the integrity of android app sandboxing via unprivileged cache side channel

Y Lin, J Wong, X Li, H Ma, D Gao - 33rd USENIX Security Symposium …, 2024 - usenix.org
Application sandboxing is a well-established security principle employed in the Android
platform to safeguard sensitive information. However, hardware resources, specifically the …

Demystifying hidden sensitive operations in android apps

X Sun, X Chen, L Li, H Cai, J Grundy, J Samhi… - ACM Transactions on …, 2023 - dl.acm.org
Security of Android devices is now paramount, given their wide adoption among consumers.
As researchers develop tools for statically or dynamically detecting suspicious apps …

Iafdroid: Demystifying collusion attacks in android ecosystem via precise inter-app analysis

B Wang, C Yang, J Ma - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
Inter-app communication mechanism allows app developers to improve Android apps'
usability and provide users with rich functions via interacting with exposed components or …

Characterizing sensor leaks in android apps

X Sun, X Chen, K Liu, S Wen, L Li… - 2021 IEEE 32nd …, 2021 - ieeexplore.ieee.org
While extremely valuable to achieve advanced functions, mobile phone sensors can be
abused by attackers to implement malicious activities in Android apps, as experimentally …

Variable-strength combinatorial testing of exported activities based on misexposure prediction

X Deng, J Yan, S Zhang, J Yan, J Zhang - Journal of Systems and Software, 2023 - Elsevier
Exported Activity (EA), a kind of activities in Android apps that can be launched by external
components, is one of the most important inter-component communication (ICC) …

DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data

X Zhang, J Heaps, R Slavin, J Niu, T Breaux… - ACM Transactions on …, 2023 - dl.acm.org
Mobile apps are widely used and often process users' sensitive data. Many taint analysis
tools have been applied to analyze sensitive information flows and report data leaks in apps …

VenomAttack: automated and adaptive activity hijacking in Android

P Sun, S Chen, L Fan, P Gao, F Song… - Frontiers of Computer …, 2023 - Springer
Activity hijacking is one of the most powerful attacks in Android. Though promising, all the
prior activity hijacking attacks suffer from some limitations and have limited attack …

Shelving it rather than Ditching it: Dynamically Debloating DEX and Native Methods of Android Applications without APK Modification

Z Zhang, J Liu, F Thung, H Ma, R Li, YN Tun… - arxiv preprint arxiv …, 2025 - arxiv.org
Today's Android developers tend to include numerous features to accommodate diverse
user requirements, which inevitably leads to bloated apps. Yet more often than not, only a …

An In-Depth Analysis of Android's Java Class Library: its Evolution and Security Impact

T Riom, A Bartel - 2023 IEEE Secure Development Conference …, 2023 - ieeexplore.ieee.org
Android is an operating system widely deployed especially on devices such as
smartphones. In this paper, we study the evolution of OpenJDK Java Class Library (JCL) …