A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features
Binary code fingerprinting is crucial in many security applications. Examples include
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …
Reliable third-party library detection in android and its security applications
Third-party libraries on Android have been shown to be security and privacy hazards by
adding security vulnerabilities to their host apps or by misusing inherited access rights …
adding security vulnerabilities to their host apps or by misusing inherited access rights …
Taintart: A practical multi-level information-flow tracking system for android runtime
Mobile operating systems like Android failed to provide sufficient protection on personal
data, and privacy leakage becomes a major concern. To understand the security risks and …
data, and privacy leakage becomes a major concern. To understand the security risks and …
" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …
The rise of the citizen developer: Assessing the security impact of online app generators
Mobile apps are increasingly created using online application generators (OAGs) that
automate app development, distribution, and maintenance. These tools significantly lower …
automate app development, distribution, and maintenance. These tools significantly lower …
Precisely Extracting Complex Variable Values from Android Apps
M Miltenberger, S Arzt - ACM Transactions on Software Engineering and …, 2024 - dl.acm.org
Millions of users nowadays rely on their smartphones to process sensitive data through apps
from various vendors and sources. Therefore, it is vital to assess these apps for security …
from various vendors and sources. Therefore, it is vital to assess these apps for security …
Orlis: Obfuscation-resilient library detection for Android
Android apps often contain third-party libraries. For many program analyses, it is important to
identify the library code in a given closed-source Android app. There are several clients of …
identify the library code in a given closed-source Android app. There are several clients of …
Offering security diagnosis as a service for cloud SaaS applications
With the maturity of service-oriented architecture (SOA), microservices architecture, and Web
technologies, web services have become critical components of Software as a Service …
technologies, web services have become critical components of Software as a Service …
Logextractor: Extracting digital evidence from android log messages via string and taint analysis
Mobile devices are increasingly involved in crimes. Therefore, digital evidence on mobile
devices plays a more and more important role in crime investigations. Existing studies have …
devices plays a more and more important role in crime investigations. Existing studies have …
Wi-Fi tracking: Fingerprinting attacks and counter-measures
C Matte - 2017 - theses.hal.science
The recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and
wearable devices) comes with a privacy threat to their owner, and to society as a whole …
wearable devices) comes with a privacy threat to their owner, and to society as a whole …