Android source code vulnerability detection: a systematic literature review

J Senanayake, H Kalutarage, MO Al-Kadri… - ACM Computing …, 2023 - dl.acm.org
The use of mobile devices is rising daily in this technological era. A continuous and
increasing number of mobile applications are constantly offered on mobile marketplaces to …

[PDF][PDF] Using ML and Data-Mining Techniques in Automatic Vulnerability Software Discovery

IA Shah, S Rajper, N ZamanJhanjhi - International Journal of …, 2021 - academia.edu
Today's age is Machine Learning (ML) and Data-Mining (DM) Techniques, as both
techniques play a significant role in measuring vulnerability prediction accuracy. In the field …

On the privacy of mental health apps: An empirical investigation and its implications for app development

LH Iwaya, MA Babar, A Rashid… - Empirical Software …, 2023 - Springer
An increasing number of mental health services are now offered through mobile health
(mHealth) systems, such as in mobile applications (apps). Although there is an …

Bug detection in Java code: An extensive evaluation of static analysis tools using Juliet Test Suites

R Amankwah, J Chen, H Song… - Software: Practice and …, 2023 - Wiley Online Library
Previous studies have demonstrated the usefulness of employing automated static analysis
tools (ASAT) and techniques to detect security bugs in software systems. However, these …

Schrödinger's security: opening the box on app developers' security rationale

D Van Der Linden, P Anthonysamy… - Proceedings of the …, 2020 - dl.acm.org
Research has established the wide variety of security failures in mobile apps, their
consequences, and how app developers introduce or exacerbate them. What is not well …

TaintBench: Automatic real-world malware benchmarking of Android taint analyses

L Luo, F Pauck, G Piskachev, M Benz… - Empirical Software …, 2022 - Springer
Due to the lack of established real-world benchmark suites for static taint analyses of
Android applications, evaluations of these analyses are often restricted and hard to …

Horus: A security assessment framework for android crypto wallets

MS Uddin, M Mannan, A Youssef - … 2021, Virtual Event, September 6–9 …, 2021 - Springer
Crypto wallet apps help cryptocurrency users to create, store, and manage keys, sign
transactions and keep track of funds. However, if these apps are not adequately protected …

A model‐based framework for inter‐app Vulnerability analysis of Android applications

A Nirumand, B Zamani, B Tork‐Ladani… - Software: Practice …, 2023 - Wiley Online Library
Android users install various apps, such as banking apps, on their smart devices dealing
with user‐sensitive information. The Android framework, via Inter‐Component …

A Comprehensive Study on Static Application Security Testing (SAST) Tools for Android

J Zhu, K Li, S Chen, L Fan, X **e - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
To identify security vulnerabilities in Android applications, numerous static application
security testing (SAST) tools have been proposed. However, it poses significant challenges …

A first look at Android applications in Google Play related to COVID-19

J Samhi, K Allix, TF Bissyandé, J Klein - Empirical Software Engineering, 2021 - Springer
Due to the convenience of access-on-demand to information and business solutions, mobile
apps have become an important asset in the digital world. In the context of the COVID-19 …