Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Smartphone security and privacy: a survey on APTs, sensor-based attacks, side-channel attacks, google play attacks, and defenses
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …
due to business dependencies such as communication, virtual meetings, and access to …
Mobile app privacy in software engineering research: A systematic map** study
Context: Mobile applications (apps) have become deeply personal, constantly demanding
access to privacy-sensitive information in exchange for more personalized user …
access to privacy-sensitive information in exchange for more personalized user …
Static window transition graphs for Android
This work develops a static analysis to create a model of the behavior of an Android
application's GUI. We propose the window transition graph (WTG), a model representing the …
application's GUI. We propose the window transition graph (WTG), a model representing the …
Security analysis of permission re-delegation vulnerabilities in Android apps
The Android platform facilitates reuse of app functionalities by allowing an app to request an
action from another app through inter-process communication mechanism. This feature is …
action from another app through inter-process communication mechanism. This feature is …
A temporal permission analysis and enforcement framework for android
Permission-induced attacks, ie, security breaches enabled by permission misuse, are
among the most critical and frequent issues threatening the security of Android devices. By …
among the most critical and frequent issues threatening the security of Android devices. By …
Discovering flaws in {Security-Focused} static analysis tools for android using systematic mutation
Mobile application security has been one of the major areas of security research in the last
decade. Numerous application analysis tools have been proposed in response to malicious …
decade. Numerous application analysis tools have been proposed in response to malicious …
Penetration frameworks and development issues in secure mobile application development: A systematic literature review
The invention of smartphones has opened a new market for mobile application
development. Amateur android app developers often do not possess knowledge of the latest …
development. Amateur android app developers often do not possess knowledge of the latest …
Iafdroid: Demystifying collusion attacks in android ecosystem via precise inter-app analysis
B Wang, C Yang, J Ma - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
Inter-app communication mechanism allows app developers to improve Android apps'
usability and provide users with rich functions via interacting with exposed components or …
usability and provide users with rich functions via interacting with exposed components or …
Towards better understanding of software quality evolution through commit-impact analysis
P Behnamghader, R Alfayez… - … on software quality …, 2017 - ieeexplore.ieee.org
Developers intend to improve the quality of the software as it evolves. However, as software
becomes larger and more complex, those intended actions may lead to unintended …
becomes larger and more complex, those intended actions may lead to unintended …
Dina: Detecting hidden android inter-app communication in dynamic loaded code
Android inter-app communication (IAC) allows apps to request functionalities from other
apps, which has been extensively used to provide a better user experience. However, IAC …
apps, which has been extensively used to provide a better user experience. However, IAC …