A survey of android application and malware hardening

V Sihag, M Vardhan, P Singh - Computer Science Review, 2021 - Elsevier
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …

Research on third-party libraries in android apps: A taxonomy and systematic literature review

X Zhan, T Liu, L Fan, L Li, S Chen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Third-party libraries (TPLs) have been widely used in mobile apps, which play an essential
part in the entire Android ecosystem. However, TPL is a double-edged sword. On the one …

Atvhunter: Reliable version detection of third-party libraries for vulnerability identification in android applications

X Zhan, L Fan, S Chen, F We, T Liu… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Third-party libraries (TPLs) as essential parts in the mobile ecosystem have become one of
the most significant contributors to the huge success of Android, which facilitate the fast …

A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware

B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang… - Proceedings of the 31st …, 2022 - dl.acm.org
As the core of IoT devices, firmware is undoubtedly vital. Currently, the development of IoT
firmware heavily depends on third-party components (TPCs), which significantly improves …

ModX: binary level partially imported third-party library detection via program modularization and semantic matching

C Yang, Z Xu, H Chen, Y Liu, X Gong… - Proceedings of the 44th …, 2022 - dl.acm.org
With the rapid growth of software, using third-party libraries (TPLs) has become increasingly
popular. The prosperity of the library usage has provided the software engineers with a …

Third-party library dependency for large-scale SCA in the C/C++ ecosystem: How far are we?

L Jiang, H Yuan, Q Tang, S Nie, S Wu… - Proceedings of the 32nd …, 2023 - dl.acm.org
Existing software composition analysis (SCA) techniques for the C/C++ ecosystem tend to
identify the reused components through feature matching between target software project …

Libdb: An effective and efficient framework for detecting third-party libraries in binaries

W Tang, Y Wang, H Zhang, S Han, P Luo… - Proceedings of the 19th …, 2022 - dl.acm.org
Third-party libraries (TPLs) are reused frequently in software applications for reducing
development cost. However, they could introduce security risks as well. Many TPL detection …

{LibScan}: Towards more precise {Third-Party} library identification for android applications

Y Wu, C Sun, D Zeng, G Tan, S Ma… - 32nd USENIX Security …, 2023 - usenix.org
Android apps pervasively use third-party libraries (TPL) to reuse functionalities and improve
development efficiency. The insufficient knowledge of the TPL internal exposes the …

Vullibgen: Identifying vulnerable third-party libraries via generative pre-trained model

T Chen, L Li, L Zhu, Z Li, G Liang, D Li, Q Wang… - arxiv preprint arxiv …, 2023 - arxiv.org
To avoid potential risks posed by vulnerabilities in third-party libraries, security researchers
maintain vulnerability databases (eg, NVD) containing vulnerability reports, each of which …

Precise and efficient patch presence test for android applications against code obfuscation

Z **e, M Wen, H Jia, X Guo, X Huang, D Zou… - Proceedings of the 32nd …, 2023 - dl.acm.org
Third-party libraries (TPLs) are widely utilized by Android developers to implement new
apps. Unfortunately, TPLs are often suffering from various vulnerabilities, which could be …