Toward engineering a secure android ecosystem: A survey of existing techniques

M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng… - ACM Computing …, 2016 - dl.acm.org
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …

Taintart: A practical multi-level information-flow tracking system for android runtime

M Sun, T Wei, JCS Lui - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Mobile operating systems like Android failed to provide sufficient protection on personal
data, and privacy leakage becomes a major concern. To understand the security risks and …

Android inter-app communication threats and detection techniques

S Bhandari, WB Jaballah, V Jain, V Laxmi… - Computers & …, 2017 - Elsevier
With the digital breakthrough, smart phones have become very essential component for
many routine tasks like shop**, paying bills, transferring money, instant messaging …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Malton: Towards {On-Device}{Non-Invasive} Mobile Malware Analysis for {ART}

L Xue, Y Zhou, T Chen, X Luo, G Gu - 26th USENIX Security Symposium …, 2017 - usenix.org
It's an essential step to understand malware's behaviors for develo** effective solutions.
Though a number of systems have been proposed to analyze Android malware, they have …

DeepAutoD: Research on distributed machine learning oriented scalable mobile communication security unpacking system

H Lu, C **, X Helu, X Du, M Guizani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The rapid growth of Android smart phones and abundant applications (Apps), a new security
solution for distributed computing and mobile communications, has prompted many …

Tackling runtime-based obfuscation in android with {TIRO}

MY Wong, D Lie - 27th USENIX security symposium (USENIX security …, 2018 - usenix.org
Obfuscation is used in malware to hide malicious activity from manual or automatic program
analysis. On the Android platform, malware has had a history of using obfuscation …

Reaper: real-time app analysis for augmenting the android permission system

M Diamantaris, EP Papadopoulos… - Proceedings of the …, 2019 - dl.acm.org
Android's app ecosystem relies heavily on third-party libraries as they facilitate code
development and provide a steady stream of revenue for developers. However, while …

Precisely Extracting Complex Variable Values from Android Apps

M Miltenberger, S Arzt - ACM Transactions on Software Engineering and …, 2024 - dl.acm.org
Millions of users nowadays rely on their smartphones to process sensitive data through apps
from various vendors and sources. Therefore, it is vital to assess these apps for security …

Android rooting: An arms race between evasion and detection

L Nguyen-Vu, NT Chau, S Kang… - Security and …, 2017 - Wiley Online Library
We present an arms race between rooting detection and rooting evasion. We investigate
different methods to detect rooted device at both Java and native level and evaluate the …