Static analysis of android apps: A systematic literature review
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …
often traversing program paths to check some program properties. Static analysis …
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
Today's smartphones are a ubiquitous source of private and confidential data. At the same
time, smartphone users are plagued by carelessly programmed apps that leak important …
time, smartphone users are plagued by carelessly programmed apps that leak important …
Iccta: Detecting inter-component privacy leaks in android apps
Shake Them All is a popular" Wallpaper" application exceeding millions of downloads on
Google Play. At installation, this application is given permission to (1) access the Internet (for …
Google Play. At installation, this application is given permission to (1) access the Internet (for …
Pscout: analyzing the android permission specification
Modern smartphone operating systems (OSs) have been developed with a greater
emphasis on security and protecting privacy. One of the mechanisms these systems use to …
emphasis on security and protecting privacy. One of the mechanisms these systems use to …
Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation)
Android is a free open-source operating system (OS), which allows an in-depth
understanding of its architecture. Therefore, many manufacturers are utilizing this OS to …
understanding of its architecture. Therefore, many manufacturers are utilizing this OS to …
[PDF][PDF] A machine-learning approach for classifying and categorizing android sources and sinks.
Today's smartphone users face a security dilemma: many apps they install operate on
privacy-sensitive data, although they might originate from developers whose trustworthiness …
privacy-sensitive data, although they might originate from developers whose trustworthiness …
Checking app behavior against app descriptions
How do we know a program does what it claims to do? After clustering Android apps by their
description topics, we identify outliers in each cluster with respect to their API usage. A" …
description topics, we identify outliers in each cluster with respect to their API usage. A" …
Droidminer: Automated mining and characterization of fine-grained malicious behaviors in android applications
Most existing malicious Android app detection approaches rely on manually selected
detection heuristics, features, and models. In this paper, we describe a new, complementary …
detection heuristics, features, and models. In this paper, we describe a new, complementary …
Beyond google play: A large-scale comparative study of chinese android app markets
China is one of the largest Android markets in the world. As Chinese users cannot access
Google Play to buy and install Android apps, a number of independent app stores have …
Google Play to buy and install Android apps, a number of independent app stores have …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …