A survey of android application and malware hardening
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …
threat to individuals, societies and nations. Anti-malware companies are often the first and …
Securing android: a survey, taxonomy, and challenges
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …
on Android. However, Android's widespread adoption is marred with increasingly rampant …
Conceptual framework for the security of mobile health applications on android platform
Mobile Health (mHealth) applications are readily accessible to the average user of mobile
devices, and despite the potential of mHealth applications to improve the availability …
devices, and despite the potential of mHealth applications to improve the availability …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
Research on third-party libraries in android apps: A taxonomy and systematic literature review
Third-party libraries (TPLs) have been widely used in mobile apps, which play an essential
part in the entire Android ecosystem. However, TPL is a double-edged sword. On the one …
part in the entire Android ecosystem. However, TPL is a double-edged sword. On the one …
WaVe: a verifiably secure WebAssembly sandboxing runtime
The promise of software sandboxing is flexible, fast and portable isolation; capturing the
benefits of hardwarebased memory protection without requiring operating system …
benefits of hardwarebased memory protection without requiring operating system …
Identifying open-source license violation and 1-day security risk at large scale
With millions of apps available to users, the mobile app market is rapidly becoming very
crowded. Given the intense competition, the time to market is a critical factor for the success …
crowded. Given the intense competition, the time to market is a critical factor for the success …
Jucify: A step towards android code unification for enhanced static analysis
Native code is now commonplace within Android app packages where it co-exists and
interacts with Dex bytecode through the Java Native Interface to deliver rich app …
interacts with Dex bytecode through the Java Native Interface to deliver rich app …
[PDF][PDF] Going native: Using a large-scale analysis of android apps to create a practical native-code sandboxing policy
Current static analysis techniques for Android applications operate at the Java level—that is,
they analyze either the Java source code or the Dalvik bytecode. However, Android allows …
they analyze either the Java source code or the Dalvik bytecode. However, Android allows …
[PDF][PDF] FLEXDROID: Enforcing In-App Privilege Separation in Android.
Mobile applications are increasingly integrating third-party libraries to provide various
features, such as advertising, analytics, social networking, and more. Unfortunately, such …
features, such as advertising, analytics, social networking, and more. Unfortunately, such …