Android security: a survey of issues, malware penetration, and defenses

P Faruki, A Bharmal, V Laxmi… - … surveys & tutorials, 2014 - ieeexplore.ieee.org
Smartphones have become pervasive due to the availability of office applications, Internet,
games, vehicle guidance using location-based services apart from conventional services …

Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version)

L Onwuzurike, E Mariconti, P Andriotis… - ACM Transactions on …, 2019 - dl.acm.org
As Android has become increasingly popular, so has malware targeting it, thus motivating
the research community to propose different detection techniques. However, the constant …

Automated test input generation for android: Are we there yet?(e)

SR Choudhary, A Gorla, A Orso - 2015 30th IEEE/ACM …, 2015 - ieeexplore.ieee.org
Like all software, mobile applications (" apps") must be adequately tested to gain confidence
that they behave correctly. Therefore, in recent years, researchers and practitioners alike …

Mamadroid: Detecting android malware by building markov chains of behavioral models

E Mariconti, L Onwuzurike, P Andriotis… - ar** in android: An essential step towards holistic security analysis
D Octeau, P McDaniel, S Jha, A Bartel… - 22nd USENIX Security …, 2013 - usenix.org
Many threats present in smartphones are the result of interactions between application
components, not just artifacts of single components. However, current techniques for …

[PDF][PDF] Intellidroid: a targeted input generator for the dynamic analysis of android malware.

MY Wong, D Lie - NDSS, 2016 - ndss-symposium.org
While dynamic malware analysis methods generally provide better precision than purely
static methods, they have the key drawback that they can only detect malicious behavior if it …

Automated concolic testing of smartphone apps

S Anand, M Naik, MJ Harrold, H Yang - Proceedings of the ACM …, 2012 - dl.acm.org
We present an algorithm and a system for generating input events to exercise smartphone
apps. Our approach is based on concolic testing and generates sequences of events …

Achieving accuracy and scalability simultaneously in detecting application clones on android markets

K Chen, P Liu, Y Zhang - … of the 36th International Conference on …, 2014 - dl.acm.org
Besides traditional problems such as potential bugs,(smartphone) application clones on
Android markets bring new threats. That is, attackers clone the code from legitimate Android …

Composite constant propagation: Application to android inter-component communication analysis

D Octeau, D Luchaup, M Dering, S Jha… - 2015 IEEE/ACM 37th …, 2015 - ieeexplore.ieee.org
Many program analyses require statically inferring the possible values of composite types.
However, current approaches either do not account for correlations between object fields or …