Android security: a survey of issues, malware penetration, and defenses
Smartphones have become pervasive due to the availability of office applications, Internet,
games, vehicle guidance using location-based services apart from conventional services …
games, vehicle guidance using location-based services apart from conventional services …
Static analysis of android apps: A systematic literature review
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …
often traversing program paths to check some program properties. Static analysis …
Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version)
As Android has become increasingly popular, so has malware targeting it, thus motivating
the research community to propose different detection techniques. However, the constant …
the research community to propose different detection techniques. However, the constant …
Automated test input generation for android: Are we there yet?(e)
Like all software, mobile applications (" apps") must be adequately tested to gain confidence
that they behave correctly. Therefore, in recent years, researchers and practitioners alike …
that they behave correctly. Therefore, in recent years, researchers and practitioners alike …
Mamadroid: Detecting android malware by building markov chains of behavioral models
E Mariconti, L Onwuzurike, P Andriotis… - ar** in android: An essential step towards holistic security analysis
Many threats present in smartphones are the result of interactions between application
components, not just artifacts of single components. However, current techniques for …
components, not just artifacts of single components. However, current techniques for …
[PDF][PDF] Intellidroid: a targeted input generator for the dynamic analysis of android malware.
While dynamic malware analysis methods generally provide better precision than purely
static methods, they have the key drawback that they can only detect malicious behavior if it …
static methods, they have the key drawback that they can only detect malicious behavior if it …
Automated concolic testing of smartphone apps
We present an algorithm and a system for generating input events to exercise smartphone
apps. Our approach is based on concolic testing and generates sequences of events …
apps. Our approach is based on concolic testing and generates sequences of events …
Achieving accuracy and scalability simultaneously in detecting application clones on android markets
Besides traditional problems such as potential bugs,(smartphone) application clones on
Android markets bring new threats. That is, attackers clone the code from legitimate Android …
Android markets bring new threats. That is, attackers clone the code from legitimate Android …
Composite constant propagation: Application to android inter-component communication analysis
Many program analyses require statically inferring the possible values of composite types.
However, current approaches either do not account for correlations between object fields or …
However, current approaches either do not account for correlations between object fields or …