Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps

S Arzt, S Rasthofer, C Fritz, E Bodden, A Bartel… - ACM sigplan …, 2014 - dl.acm.org
Today's smartphones are a ubiquitous source of private and confidential data. At the same
time, smartphone users are plagued by carelessly programmed apps that leak important …

Iccta: Detecting inter-component privacy leaks in android apps

L Li, A Bartel, TF Bissyandé, J Klein… - 2015 IEEE/ACM 37th …, 2015 - ieeexplore.ieee.org
Shake Them All is a popular" Wallpaper" application exceeding millions of downloads on
Google Play. At installation, this application is given permission to (1) access the Internet (for …

Pscout: analyzing the android permission specification

KWY Au, YF Zhou, Z Huang, D Lie - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Modern smartphone operating systems (OSs) have been developed with a greater
emphasis on security and protecting privacy. One of the mechanisms these systems use to …

Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation)

R Jusoh, A Firdaus, S Anwar, MZ Osman… - PeerJ Computer …, 2021 - peerj.com
Android is a free open-source operating system (OS), which allows an in-depth
understanding of its architecture. Therefore, many manufacturers are utilizing this OS to …

[PDF][PDF] A machine-learning approach for classifying and categorizing android sources and sinks.

S Rasthofer, S Arzt, E Bodden - NDSS, 2014 - bodden.de
Today's smartphone users face a security dilemma: many apps they install operate on
privacy-sensitive data, although they might originate from developers whose trustworthiness …

Checking app behavior against app descriptions

A Gorla, I Tavecchia, F Gross, A Zeller - Proceedings of the 36th …, 2014 - dl.acm.org
How do we know a program does what it claims to do? After clustering Android apps by their
description topics, we identify outliers in each cluster with respect to their API usage. A" …

Droidminer: Automated mining and characterization of fine-grained malicious behaviors in android applications

C Yang, Z Xu, G Gu, V Yegneswaran… - … Security-ESORICS 2014 …, 2014 - Springer
Most existing malicious Android app detection approaches rely on manually selected
detection heuristics, features, and models. In this paper, we describe a new, complementary …

Beyond google play: A large-scale comparative study of chinese android app markets

H Wang, Z Liu, J Liang, N Vallina-Rodriguez… - Proceedings of the …, 2018 - dl.acm.org
China is one of the largest Android markets in the world. As Chinese users cannot access
Google Play to buy and install Android apps, a number of independent app stores have …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …