The evolution of android malware and android analysis techniques
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
Android security: a survey of issues, malware penetration, and defenses
Smartphones have become pervasive due to the availability of office applications, Internet,
games, vehicle guidance using location-based services apart from conventional services …
games, vehicle guidance using location-based services apart from conventional services …
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
Today's smartphones are a ubiquitous source of private and confidential data. At the same
time, smartphone users are plagued by carelessly programmed apps that leak important …
time, smartphone users are plagued by carelessly programmed apps that leak important …
Iccta: Detecting inter-component privacy leaks in android apps
Shake Them All is a popular" Wallpaper" application exceeding millions of downloads on
Google Play. At installation, this application is given permission to (1) access the Internet (for …
Google Play. At installation, this application is given permission to (1) access the Internet (for …
Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version)
As Android has become increasingly popular, so has malware targeting it, thus motivating
the research community to propose different detection techniques. However, the constant …
the research community to propose different detection techniques. However, the constant …
Static analysis of android apps: A systematic literature review
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …
often traversing program paths to check some program properties. Static analysis …
Mamadroid: Detecting android malware by building markov chains of behavioral models
The rise in popularity of the Android platform has resulted in an explosion of malware threats
targeting it. As both Android malware and the operating system itself constantly evolve, it is …
targeting it. As both Android malware and the operating system itself constantly evolve, it is …
[PDF][PDF] Information flow analysis of android applications in droidsafe.
We present DroidSafe, a static information flow analysis tool that reports potential leaks of
sensitive information in Android applications. DroidSafe combines a comprehensive …
sensitive information in Android applications. DroidSafe combines a comprehensive …
50 ways to leak your data: An exploration of apps' circumvention of the android permissions system
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …
sensitive data and system resources. However, apps can circumvent the permission model …
“Won't somebody think of the children?” examining COPPA compliance at scale
We present a scalable dynamic analysis frame-work that allows for the automatic evaluation
of the privacy behaviors of Android apps. We use our system to analyze mobile apps' …
of the privacy behaviors of Android apps. We use our system to analyze mobile apps' …