Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

A survey of malware detection in Android apps: Recommendations and perspectives for future research

A Razgallah, R Khoury, S Hallé… - Computer Science …, 2021 - Elsevier
Android has dominated the smartphone market and has become the most popular operating
system for mobile devices. However, security threats in Android applications have also …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Collusive data leak and more: Large-scale threat analysis of inter-app communications

A Bosu, F Liu, D Yao, G Wang - Proceedings of the 2017 ACM on Asia …, 2017 - dl.acm.org
Inter-Component Communication (ICC) provides a message passing mechanism for data
exchange between Android applications. It has been long believed that inter-app ICCs can …

Internal factors, external factors and behavioral intention toward food delivery apps (FDAs)

KSP Ng, J Zhang, JWC Wong, KK Luo - British Food Journal, 2023 - emerald.com
Purpose Food delivery apps (FDAs), as a well-known technology, have been widely
adopted by restaurants and customers. Different from existing studies in this field that mainly …

Detection of repackaged android malware with code-heterogeneity features

K Tian, D Yao, BG Ryder, G Tan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
During repackaging, malware writers statically inject malcode and modify the control flow to
ensure its execution. Repackaged malware is difficult to detect by existing classification …

Leila: formal tool for identifying mobile malicious behaviour

G Canfora, F Martinelli, F Mercaldo… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
With the increasing diffusion of mobile technologies, nowadays mobile devices represent an
irreplaceable tool to perform several operations, from posting a status on a social network to …

A deep learning system for health care IoT and smartphone malware detection

M Amin, D Shehwar, A Ullah, T Guarda… - Neural Computing and …, 2022 - Springer
The use of smart and connected devices, such as Android and Internet of Things (IoT) have
increased exponentially. In the last 10 years, mobiles and IoT devices have surpassed PC's …

Identifying mobile inter-app communication risks

KO Elish, H Cai, D Barton, D Yao… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Malware collusion is a technique utilized by attackers to evade standard detection. It is a
new threat where two or more applications, appearing benign, communicate to perform a …

Android inter-app communication threats and detection techniques

S Bhandari, WB Jaballah, V Jain, V Laxmi… - Computers & …, 2017 - Elsevier
With the digital breakthrough, smart phones have become very essential component for
many routine tasks like shop**, paying bills, transferring money, instant messaging …