Research on third-party libraries in android apps: A taxonomy and systematic literature review

X Zhan, T Liu, L Fan, L Li, S Chen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Third-party libraries (TPLs) have been widely used in mobile apps, which play an essential
part in the entire Android ecosystem. However, TPL is a double-edged sword. On the one …

A formal approach for detection of security flaws in the android permission system

H Bagheri, E Kang, S Malek, D Jackson - Formal Aspects of Computing, 2018 - Springer
The ever increasing expansion of mobile applications into nearly every aspect of modern
life, from banking to healthcare systems, is making their security more important than ever …

A temporal permission analysis and enforcement framework for android

A Sadeghi, R Jabbarvand, N Ghorbani… - Proceedings of the 40th …, 2018 - dl.acm.org
Permission-induced attacks, ie, security breaches enabled by permission misuse, are
among the most critical and frequent issues threatening the security of Android devices. By …

Dina: Detecting hidden android inter-app communication in dynamic loaded code

M Alhanahnah, Q Yan, H Bagheri… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Android inter-app communication (IAC) allows apps to request functionalities from other
apps, which has been extensively used to provide a better user experience. However, IAC …

Behaviour analysis of inter-app communication using a lightweight monitoring app for malware detection

M Grace, M Sughasiny - Expert Systems with Applications, 2022 - Elsevier
Smartphone communications are becoming more and more useful for businesses to plan
and organize their work and are mainly operated with android applications. The …

Deldroid: an automated approach for determination and enforcement of least-privilege architecture in android

M Hammad, H Bagheri, S Malek - Journal of Systems and Software, 2019 - Elsevier
Android is widely used for the development and deployment of autonomous and smart
systems, including software targeted for IoT and mobile devices. Security of such systems is …

Self-protection of android systems from inter-component communication attacks

M Hammad, J Garcia, S Malek - Proceedings of the 33rd ACM/IEEE …, 2018 - dl.acm.org
The current security mechanisms for Android apps, both static and dynamic analysis
approaches, are insufficient for detection and prevention of the increasingly dynamic and …

Flair: efficient analysis of Android inter-component vulnerabilities in response to incremental changes

H Bagheri, J Wang, J Aerts, N Ghorbani… - Empirical Software …, 2021 - Springer
Inter-component communication (ICC) among Android apps is shown to be the source of
many security vulnerabilities. Prior research has developed compositional analyses to …

Efficient, evolutionary security analysis of interacting android apps

H Bagheri, J Wang, J Aerts… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
In parallel with the increasing popularity of mobile software, an alarming escalation in the
number and sophistication of security threats is observed on mobile platforms, remarkably …

OVERVIEW OF DATA SECURITY, CLASSIFICATION AND CONTROL MEASURE: A STUDY.

M Sharma, H **dal, S Kumar… - I-Manager's Journal on …, 2021 - search.ebscohost.com
Data is a more basic resource for all associations than at any other time in recent memory.
Recent advances and models such as sensor platforms, IoT, distributed computing, and …