Android source code vulnerability detection: a systematic literature review
The use of mobile devices is rising daily in this technological era. A continuous and
increasing number of mobile applications are constantly offered on mobile marketplaces to …
increasing number of mobile applications are constantly offered on mobile marketplaces to …
Challenges for static analysis of java reflection-literature review and empirical study
The behavior of software that uses the Java Reflection API is fundamentally hard to predict
by analyzing code. Only recent static analysis approaches can resolve reflection under …
by analyzing code. Only recent static analysis approaches can resolve reflection under …
Taintart: A practical multi-level information-flow tracking system for android runtime
Mobile operating systems like Android failed to provide sufficient protection on personal
data, and privacy leakage becomes a major concern. To understand the security risks and …
data, and privacy leakage becomes a major concern. To understand the security risks and …
" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
Do android taint analysis tools keep their promises?
In recent years, researchers have developed a number of tools to conduct taint analysis of
Android applications. While all the respective papers aim at providing a thorough empirical …
Android applications. While all the respective papers aim at providing a thorough empirical …
Android security assessment: A review, taxonomy and research gap study
Security threats are escalating exponentially posing a serious challenge to mobile platforms,
specifically Android. In recent years the number of attacks has not only increased but each …
specifically Android. In recent years the number of attacks has not only increased but each …
Static detection of unsafe {DMA} accesses in device drivers
Direct Memory Access (DMA) is a popular mechanism for improving hardware I/O
performance, and it has been widely used by many existing device drivers. However, DMA …
performance, and it has been widely used by many existing device drivers. However, DMA …
{FlowDist}:{Multi-Staged}{Refinement-Based} Dynamic Information Flow Analysis for Distributed Software Systems
Dynamic information flow analysis (DIFA) supports various security applications such as
malware analysis and vulnerability discovery. Yet traditional DIFA approaches have limited …
malware analysis and vulnerability discovery. Yet traditional DIFA approaches have limited …
[HTML][HTML] Automated forensic analysis of mobile applications on Android devices
It is not uncommon that mobile phones are involved in criminal activities, eg, the
surreptitious collection of credit card information. Forensic analysis of mobile applications …
surreptitious collection of credit card information. Forensic analysis of mobile applications …