* droid: Assessment and evaluation of android application analysis tools

B Reaves, J Bowers, SA Gorski III, O Anise… - ACM Computing …, 2016 - dl.acm.org
The security research community has invested significant effort in improving the security of
Android applications over the past half decade. This effort has addressed a wide range of …

Triggerscope: Towards detecting logic bombs in android applications

Y Fratantonio, A Bianchi, W Robertson… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Android is the most popular mobile platform today, and it is also the mobile operating system
that is most heavily targeted by malware. Existing static analyses are effective in detecting …

Analyzing the analyzers: Flowdroid/iccta, amandroid, and droidsafe

L Qiu, Y Wang, J Rubin - Proceedings of the 27th ACM SIGSOFT …, 2018 - dl.acm.org
Numerous static analysis techniques have recently been proposed for identifying
information flows in mobile applications. These techniques are compared to each other …

Android malware detection using complex-flows

F Shen, J Del Vecchio, A Mohaisen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper proposes a new technique to detect mobile malware based on information flow
analysis. Our approach examines the structure of information flows to identify patterns of …

Analyses for specific defects in android applications: a survey

T Wu, X Deng, J Yan, J Zhang - Frontiers of Computer Science, 2019 - Springer
Android applications (APPS) are in widespread use and have enriched our life. To ensure
the quality and security of the apps, many approaches have been proposed in recent years …

Towards privacy risk analysis in android applications using machine learning approaches

K Sharma, BB Gupta - Research Anthology on Securing Mobile …, 2021 - igi-global.com
Android-based devices easily fall prey to an attack due to its free availability in the android
market. These Android applications are not certified by the legitimate organization. If the …

Mining semantic loop idioms

M Allamanis, ET Barr, C Bird, P Devanbu… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
To write code, developers stitch together patterns, like API protocols or data structure
traversals. Discovering these patterns can identify inconsistencies in code or opportunities to …

Android authorship attribution through string analysis

V Kalgutkar, N Stakhanova, P Cook… - Proceedings of the 13th …, 2018 - dl.acm.org
With the rising popularity of Android mobile devices, the amount of malicious applications
targeting the Android platform has been increasing tremendously. To mitigate the risk of …

An empirical study of local database usage in android applications

Y Lyu, J Gui, M Wan… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Local databases have become an important component within mobile applications.
Developers use local databases to provide mobile users with a responsive and secure …

Analyzing android taint analysis tools: FlowDroid, Amandroid, and DroidSafe

J Zhang, Y Wang, L Qiu, J Rubin - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Numerous static taint analysis techniques have recently been proposed for identifying
information flows in mobile applications. These techniques are often optimized and …