Understanding the evolution of android app vulnerabilities

J Gao, L Li, P Kong, TF Bissyandé… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The Android ecosystem today is a growing universe of a few billion devices, hundreds of
millions of users and millions of applications targeting a wide range of activities where …

An empirical study on android-related vulnerabilities

M Linares-Vásquez, G Bavota… - 2017 ieee/acm 14th …, 2017 - ieeexplore.ieee.org
Mobile devices are used more and more in everyday life. They are our cameras, wallets, and
keys. Basically, they embed most of our private information in our pocket. For this and other …

[HTML][HTML] Taxonomy of security weaknesses in Java and Kotlin Android apps

A Mazuera-Rozo, C Escobar-Velásquez… - Journal of systems and …, 2022 - Elsevier
Android is nowadays the most popular operating system in the world, not only in the realm of
mobile devices, but also when considering desktop and laptop computers. Such a popularity …

Artist: The android runtime instrumentation and security toolkit

M Backes, S Bugiel, O Schranz… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
With the introduction of Android 5 Lollipop, the Android Runtime (ART) superseded the
Dalvik Virtual Machine (DVM) by introducing ahead-of-time compilation and native …

Analyses for specific defects in android applications: a survey

T Wu, X Deng, J Yan, J Zhang - Frontiers of Computer Science, 2019 - Springer
Android applications (APPS) are in widespread use and have enriched our life. To ensure
the quality and security of the apps, many approaches have been proposed in recent years …

Taintman: An art-compatible dynamic taint analysis framework on unmodified and non-rooted android devices

W You, B Liang, W Shi, P Wang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Dynamic taint analysis (DTA), as a mainstream information flow tracking technique, has
been widely used in mobile security. On the Android platform, the existing DTA approaches …

Up-to-crash: Evaluating third-party library updatability on android

J Huang, N Borges, S Bugiel… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Buggy and flawed third-party libraries increase their host app's attack surface and put the
users' privacy at risk. To avert this risk, libraries have to be kept updated to their newest …

The Android OS stack and its vulnerabilities: an empirical study

A Mazuera-Rozo, J Bautista-Mora… - Empirical Software …, 2019 - Springer
The wide and rapid adoption of Android-based devices in the last years has motivated the
usage of Android apps to support a broad range of daily activities. In that sense, being the …

Resilient user-side android application repackaging and tampering detection using cryptographically obfuscated logic bombs

Q Zeng, L Luo, Z Qian, X Du, Z Li… - … on Dependable and …, 2019 - ieeexplore.ieee.org
Application repackaging is a severe threat to Android users and the market. Not only does it
infringe on intellectual property, but it is also one of the most common ways of propagating …

" Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps

L Shi, J Fu, Z Guo, J Ming - Proceedings of the 17th Annual International …, 2019 - dl.acm.org
Recent developed application-level virtualization brings a groundbreaking innovation to
Android ecosystem: a host app is able to load and launch arbitrary guest APK files without …