A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features

S Alrabaee, M Debbabi, L Wang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Binary code fingerprinting is crucial in many security applications. Examples include
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …

Reliable third-party library detection in android and its security applications

M Backes, S Bugiel, E Derr - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Third-party libraries on Android have been shown to be security and privacy hazards by
adding security vulnerabilities to their host apps or by misusing inherited access rights …

Taintart: A practical multi-level information-flow tracking system for android runtime

M Sun, T Wei, JCS Lui - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Mobile operating systems like Android failed to provide sufficient protection on personal
data, and privacy leakage becomes a major concern. To understand the security risks and …

" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing

AS Ami, K Moran, D Poshyvanyk… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …

The rise of the citizen developer: Assessing the security impact of online app generators

M Oltrogge, E Derr, C Stransky, Y Acar… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Mobile apps are increasingly created using online application generators (OAGs) that
automate app development, distribution, and maintenance. These tools significantly lower …

Precisely Extracting Complex Variable Values from Android Apps

M Miltenberger, S Arzt - ACM Transactions on Software Engineering and …, 2024 - dl.acm.org
Millions of users nowadays rely on their smartphones to process sensitive data through apps
from various vendors and sources. Therefore, it is vital to assess these apps for security …

Orlis: Obfuscation-resilient library detection for Android

Y Wang, H Wu, H Zhang, A Rountev - Proceedings of the 5th …, 2018 - dl.acm.org
Android apps often contain third-party libraries. For many program analyses, it is important to
identify the library code in a given closed-source Android app. There are several clients of …

Offering security diagnosis as a service for cloud SaaS applications

M Elsayed, M Zulkernine - Journal of information security and applications, 2019 - Elsevier
With the maturity of service-oriented architecture (SOA), microservices architecture, and Web
technologies, web services have become critical components of Software as a Service …

Logextractor: Extracting digital evidence from android log messages via string and taint analysis

CCC Cheng, C Shi, NZ Gong, Y Guan - Forensic Science International …, 2021 - Elsevier
Mobile devices are increasingly involved in crimes. Therefore, digital evidence on mobile
devices plays a more and more important role in crime investigations. Existing studies have …

Wi-Fi tracking: Fingerprinting attacks and counter-measures

C Matte - 2017 - theses.hal.science
The recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and
wearable devices) comes with a privacy threat to their owner, and to society as a whole …