Android source code vulnerability detection: a systematic literature review

J Senanayake, H Kalutarage, MO Al-Kadri… - ACM Computing …, 2023 - dl.acm.org
The use of mobile devices is rising daily in this technological era. A continuous and
increasing number of mobile applications are constantly offered on mobile marketplaces to …

Automatic detection of Java cryptographic API misuses: Are we there yet?

Y Zhang, MMA Kabir, Y **ao, D Yao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Java platform provides various cryptographic APIs to facilitate secure coding. However,
correctly using these APIs is challenging for developers who lack cybersecurity training …

Llbezpeky: Leveraging large language models for vulnerability detection

NS Mathews, Y Brus, Y Aafer, M Nagappan… - arxiv preprint arxiv …, 2024 - arxiv.org
Despite the continued research and progress in building secure systems, Android
applications continue to be ridden with vulnerabilities, necessitating effective detection …

On the impact of sample duplication in machine-learning-based android malware detection

Y Zhao, L Li, H Wang, H Cai, TF Bissyandé… - ACM Transactions on …, 2021 - dl.acm.org
Malware detection at scale in the Android realm is often carried out using machine learning
techniques. State-of-the-art approaches such as DREBIN and MaMaDroid are reported to …

Explainable ai for android malware detection: Towards understanding why the models perform so well?

Y Liu, C Tantithamthavorn, L Li… - 2022 IEEE 33rd …, 2022 - ieeexplore.ieee.org
Machine learning (ML)-based Android malware detection has been one of the most popular
research topics in the mobile security community. An increasing number of research studies …

Androzooopen: Collecting large-scale open source android apps for the research community

P Liu, L Li, Y Zhao, X Sun, J Grundy - Proceedings of the 17th …, 2020 - dl.acm.org
It is critical for research to have an open, well-curated, representative set of apps for
analysis. We present a collection of open-source Android apps collected from several …

[HTML][HTML] Taxonomy of security weaknesses in Java and Kotlin Android apps

A Mazuera-Rozo, C Escobar-Velásquez… - Journal of systems and …, 2022 - Elsevier
Android is nowadays the most popular operating system in the world, not only in the realm of
mobile devices, but also when considering desktop and laptop computers. Such a popularity …

MaDroid: A maliciousness-aware multifeatured dataset for detecting android malware

G Duan, H Liu, M Cai, J Sun, H Chen - Computers & Security, 2024 - Elsevier
Abstract System call sequences representing the runtime behavior of an application is
particularly useful for anomaly detection in mobile applications. However, one of the main …

[PDF][PDF] Advanced threat detection in api security: Leveraging machine learning algorithms

P Ranjan, S Dahiya - International Journal of Communication …, 2021 - researchgate.net
As APIs become the backbone of modern digital ecosystems, ensuring their security against
evolving cyber threats is critical. Traditional security measures often fall short in detecting …

Taming reflection: An essential step toward whole-program analysis of android apps

X Sun, L Li, TF Bissyandé, J Klein, D Octeau… - ACM Transactions on …, 2021 - dl.acm.org
Android developers heavily use reflection in their apps for legitimate reasons. However,
reflection is also significantly used for hiding malicious actions. Unfortunately, current state …