Android source code vulnerability detection: a systematic literature review
The use of mobile devices is rising daily in this technological era. A continuous and
increasing number of mobile applications are constantly offered on mobile marketplaces to …
increasing number of mobile applications are constantly offered on mobile marketplaces to …
[PDF][PDF] Using ML and Data-Mining Techniques in Automatic Vulnerability Software Discovery
Today's age is Machine Learning (ML) and Data-Mining (DM) Techniques, as both
techniques play a significant role in measuring vulnerability prediction accuracy. In the field …
techniques play a significant role in measuring vulnerability prediction accuracy. In the field …
On the privacy of mental health apps: An empirical investigation and its implications for app development
An increasing number of mental health services are now offered through mobile health
(mHealth) systems, such as in mobile applications (apps). Although there is an …
(mHealth) systems, such as in mobile applications (apps). Although there is an …
Bug detection in Java code: An extensive evaluation of static analysis tools using Juliet Test Suites
R Amankwah, J Chen, H Song… - Software: Practice and …, 2023 - Wiley Online Library
Previous studies have demonstrated the usefulness of employing automated static analysis
tools (ASAT) and techniques to detect security bugs in software systems. However, these …
tools (ASAT) and techniques to detect security bugs in software systems. However, these …
Schrödinger's security: opening the box on app developers' security rationale
Research has established the wide variety of security failures in mobile apps, their
consequences, and how app developers introduce or exacerbate them. What is not well …
consequences, and how app developers introduce or exacerbate them. What is not well …
TaintBench: Automatic real-world malware benchmarking of Android taint analyses
Due to the lack of established real-world benchmark suites for static taint analyses of
Android applications, evaluations of these analyses are often restricted and hard to …
Android applications, evaluations of these analyses are often restricted and hard to …
Horus: A security assessment framework for android crypto wallets
Crypto wallet apps help cryptocurrency users to create, store, and manage keys, sign
transactions and keep track of funds. However, if these apps are not adequately protected …
transactions and keep track of funds. However, if these apps are not adequately protected …
A model‐based framework for inter‐app Vulnerability analysis of Android applications
Android users install various apps, such as banking apps, on their smart devices dealing
with user‐sensitive information. The Android framework, via Inter‐Component …
with user‐sensitive information. The Android framework, via Inter‐Component …
A Comprehensive Study on Static Application Security Testing (SAST) Tools for Android
To identify security vulnerabilities in Android applications, numerous static application
security testing (SAST) tools have been proposed. However, it poses significant challenges …
security testing (SAST) tools have been proposed. However, it poses significant challenges …
A first look at Android applications in Google Play related to COVID-19
Due to the convenience of access-on-demand to information and business solutions, mobile
apps have become an important asset in the digital world. In the context of the COVID-19 …
apps have become an important asset in the digital world. In the context of the COVID-19 …