The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

Semantics-aware android malware classification using weighted contextual api dependency graphs

M Zhang, Y Duan, H Yin, Z Zhao - … of the 2014 ACM SIGSAC conference …, 2014 - dl.acm.org
The drastic increase of Android malware has led to a strong interest in develo** methods
to automate the malware analysis process. Existing automated Android malware detection …

Composite constant propagation: Application to android inter-component communication analysis

D Octeau, D Luchaup, M Dering, S Jha… - 2015 IEEE/ACM 37th …, 2015 - ieeexplore.ieee.org
Many program analyses require statically inferring the possible values of composite types.
However, current approaches either do not account for correlations between object fields or …

Iccdetector: Icc-based malware detection on android

K Xu, Y Li, RH Deng - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
Most existing mobile malware detection methods (eg, Kirin and DroidMat) are designed
based on the resources required by malwares (eg, permissions, application programming …

Securing android: a survey, taxonomy, and challenges

Sufatrio, DJJ Tan, TW Chua, VLL Thing - ACM Computing Surveys …, 2015 - dl.acm.org
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …

Droidra: Taming reflection to support whole-program analysis of android apps

L Li, TF Bissyandé, D Octeau, J Klein - Proceedings of the 25th …, 2016 - dl.acm.org
Android developers heavily use reflection in their apps for legitimate reasons, but also
significantly for hiding malicious actions. Unfortunately, current state-of-the-art static analysis …

[PDF][PDF] Harvesting runtime values in Android applications that feature anti-analysis techniques.

S Rasthofer, S Arzt, M Miltenberger, E Bodden - NDSS, 2016 - ndss-symposium.org
It is generally challenging to tell apart malware from benign applications. To make this
decision, human analysts are frequently interested in runtime values: targets of reflective …

Code injection attacks on html5-based mobile apps: Characterization, detection and mitigation

X **, X Hu, K Ying, W Du, H Yin, GN Peri - Proceedings of the 2014 …, 2014 - dl.acm.org
Due to the portability advantage, HTML5-based mobile apps are getting more and more
popular. Unfortunately, the web technology used by HTML5-based mobile apps has a …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …