Android source code vulnerability detection: a systematic literature review

J Senanayake, H Kalutarage, MO Al-Kadri… - ACM Computing …, 2023 - dl.acm.org
The use of mobile devices is rising daily in this technological era. A continuous and
increasing number of mobile applications are constantly offered on mobile marketplaces to …

Challenges for static analysis of java reflection-literature review and empirical study

D Landman, A Serebrenik… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
The behavior of software that uses the Java Reflection API is fundamentally hard to predict
by analyzing code. Only recent static analysis approaches can resolve reflection under …

Taintart: A practical multi-level information-flow tracking system for android runtime

M Sun, T Wei, JCS Lui - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Mobile operating systems like Android failed to provide sufficient protection on personal
data, and privacy leakage becomes a major concern. To understand the security risks and …

" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing

AS Ami, K Moran, D Poshyvanyk… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Do android taint analysis tools keep their promises?

F Pauck, E Bodden, H Wehrheim - Proceedings of the 2018 26th ACM …, 2018 - dl.acm.org
In recent years, researchers have developed a number of tools to conduct taint analysis of
Android applications. While all the respective papers aim at providing a thorough empirical …

Android security assessment: A review, taxonomy and research gap study

S Garg, N Baliyan - Computers & Security, 2021 - Elsevier
Security threats are escalating exponentially posing a serious challenge to mobile platforms,
specifically Android. In recent years the number of attacks has not only increased but each …

Static detection of unsafe {DMA} accesses in device drivers

JJ Bai, T Li, K Lu, SM Hu - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
Direct Memory Access (DMA) is a popular mechanism for improving hardware I/O
performance, and it has been widely used by many existing device drivers. However, DMA …

{FlowDist}:{Multi-Staged}{Refinement-Based} Dynamic Information Flow Analysis for Distributed Software Systems

X Fu, H Cai - 30th USENIX security symposium (USENIX Security 21 …, 2021 - usenix.org
Dynamic information flow analysis (DIFA) supports various security applications such as
malware analysis and vulnerability discovery. Yet traditional DIFA approaches have limited …

[HTML][HTML] Automated forensic analysis of mobile applications on Android devices

X Lin, T Chen, T Zhu, K Yang, F Wei - Digital Investigation, 2018 - Elsevier
It is not uncommon that mobile phones are involved in criminal activities, eg, the
surreptitious collection of credit card information. Forensic analysis of mobile applications …