Android source code vulnerability detection: a systematic literature review
The use of mobile devices is rising daily in this technological era. A continuous and
increasing number of mobile applications are constantly offered on mobile marketplaces to …
increasing number of mobile applications are constantly offered on mobile marketplaces to …
Automatic detection of Java cryptographic API misuses: Are we there yet?
The Java platform provides various cryptographic APIs to facilitate secure coding. However,
correctly using these APIs is challenging for developers who lack cybersecurity training …
correctly using these APIs is challenging for developers who lack cybersecurity training …
Llbezpeky: Leveraging large language models for vulnerability detection
Despite the continued research and progress in building secure systems, Android
applications continue to be ridden with vulnerabilities, necessitating effective detection …
applications continue to be ridden with vulnerabilities, necessitating effective detection …
On the impact of sample duplication in machine-learning-based android malware detection
Malware detection at scale in the Android realm is often carried out using machine learning
techniques. State-of-the-art approaches such as DREBIN and MaMaDroid are reported to …
techniques. State-of-the-art approaches such as DREBIN and MaMaDroid are reported to …
Explainable ai for android malware detection: Towards understanding why the models perform so well?
Machine learning (ML)-based Android malware detection has been one of the most popular
research topics in the mobile security community. An increasing number of research studies …
research topics in the mobile security community. An increasing number of research studies …
Androzooopen: Collecting large-scale open source android apps for the research community
It is critical for research to have an open, well-curated, representative set of apps for
analysis. We present a collection of open-source Android apps collected from several …
analysis. We present a collection of open-source Android apps collected from several …
[HTML][HTML] Taxonomy of security weaknesses in Java and Kotlin Android apps
Android is nowadays the most popular operating system in the world, not only in the realm of
mobile devices, but also when considering desktop and laptop computers. Such a popularity …
mobile devices, but also when considering desktop and laptop computers. Such a popularity …
MaDroid: A maliciousness-aware multifeatured dataset for detecting android malware
Abstract System call sequences representing the runtime behavior of an application is
particularly useful for anomaly detection in mobile applications. However, one of the main …
particularly useful for anomaly detection in mobile applications. However, one of the main …
[PDF][PDF] Advanced threat detection in api security: Leveraging machine learning algorithms
As APIs become the backbone of modern digital ecosystems, ensuring their security against
evolving cyber threats is critical. Traditional security measures often fall short in detecting …
evolving cyber threats is critical. Traditional security measures often fall short in detecting …
Taming reflection: An essential step toward whole-program analysis of android apps
Android developers heavily use reflection in their apps for legitimate reasons. However,
reflection is also significantly used for hiding malicious actions. Unfortunately, current state …
reflection is also significantly used for hiding malicious actions. Unfortunately, current state …