Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps

S Arzt, S Rasthofer, C Fritz, E Bodden, A Bartel… - ACM sigplan …, 2014 - dl.acm.org
Today's smartphones are a ubiquitous source of private and confidential data. At the same
time, smartphone users are plagued by carelessly programmed apps that leak important …

Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps

F Wei, S Roy, X Ou, Robby - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
We present a new approach to static analysis for security vetting of Android apps and a
general framework called Amandroid. Amandroid determines points-to information for all …

Apposcopy: Semantics-based detection of android malware through static analysis

Y Feng, S Anand, I Dillig, A Aiken - Proceedings of the 22nd ACM …, 2014 - dl.acm.org
We present Apposcopy, a new semantics-based approach for identifying a prevalent class of
Android malware that steals private user information. Apposcopy incorporates (i) a high …

Checking app behavior against app descriptions

A Gorla, I Tavecchia, F Gross, A Zeller - Proceedings of the 36th …, 2014 - dl.acm.org
How do we know a program does what it claims to do? After clustering Android apps by their
description topics, we identify outliers in each cluster with respect to their API usage. A" …

Asdroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction

J Huang, X Zhang, L Tan, P Wang, B Liang - Proceedings of the 36th …, 2014 - dl.acm.org
Android smartphones are becoming increasingly popular. The open nature of Android
allows users to install miscellaneous applications, including the malicious ones, from third …

Data flow based behavioral analysis on mobile devices

V Sridhara, SAK Gathala, R Gupta - US Patent 9,607,146, 2017 - Google Patents
Methods, devices and systems for detecting suspicious or performance-degrading mobile
device behaviors intelligently, dynamically, and/or adaptively determine computing device …

" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing

AS Ami, K Moran, D Poshyvanyk… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …

Scalable and precise taint analysis for android

W Huang, Y Dong, A Milanova, J Dolby - Proceedings of the 2015 …, 2015 - dl.acm.org
We propose a type-based taint analysis for Android. Concretely, we present DFlow, a
context-sensitive information flow type system, and DroidInfer, the corresponding type …

Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes

S Arzt, E Bodden - Proceedings of the 36th International Conference on …, 2014 - dl.acm.org
Most application code evolves incrementally, and especially so when being maintained after
the applications have been deployed. Yet, most data-flow analyses do not take advantage of …

Static analysis of implicit control flow: Resolving java reflection and android intents (t)

P Barros, R Just, S Millstein, P Vines… - 2015 30th IEEE/ACM …, 2015 - ieeexplore.ieee.org
Implicit or indirect control flow is a transfer of control between procedures using some
mechanism other than an explicit procedure call. Implicit control flow is a staple design …