[PDF][PDF] Enhancing security of linux-based android devices

AD Schmidt, HG Schmidt, J Clausen… - Proceedings of 15th …, 2008 - researchgate.net
Our daily lives become more and more dependent upon smartphones due to their increased
capabilities. Smartphones are used in various ways from payment systems to assisting the …

The Android OS stack and its vulnerabilities: an empirical study

A Mazuera-Rozo, J Bautista-Mora… - Empirical Software …, 2019 - Springer
The wide and rapid adoption of Android-based devices in the last years has motivated the
usage of Android apps to support a broad range of daily activities. In that sense, being the …

[PDF][PDF] Analysis of android vulnerabilities and modern exploitation techniques

H Shewale, S Patil, V Deshmukh… - ICTACT journal on …, 2014 - pdfs.semanticscholar.org
Android is an operating system based on the Linux kernel. It is the most widely used and
popular operating system among Smartphones and portable devices. Its programmable and …

Vetting undesirable behaviors in android apps with permission use analysis

Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning… - Proceedings of the …, 2013 - dl.acm.org
Android platform adopts permissions to protect sensitive resources from untrusted apps.
However, after permissions are granted by users at install time, apps could use these …

MalRadar: Demystifying android malware in the new era

L Wang, H Wang, R He, R Tao, G Meng… - Proceedings of the ACM …, 2022 - dl.acm.org
Mobile malware detection has attracted massive research effort in our community. A reliable
and up-to-date malware dataset is critical to evaluate the effectiveness of malware detection …

An Android runtime security policy enforcement framework

H Banuri, M Alam, S Khan, J Manzoor, B Ali… - Personal and Ubiquitous …, 2012 - Springer
Today, smart phone's malwares are deceptive enough to spoof itself as a legal mobile
application. The front-end service of Trojans is attractive enough to deceive mobile users …

Towards analyzing the input validation vulnerabilities associated with android system services

C Cao, N Gao, P Liu, J Xiang - … of the 31st Annual Computer Security …, 2015 - dl.acm.org
Although the input validation vulnerabilities play a critical role in web application security,
such vulnerabilities are so far largely neglected in the Android security research community …

Juxtapp: A scalable system for detecting code reuse among android applications

S Hanna, L Huang, E Wu, S Li, C Chen… - Detection of Intrusions and …, 2013 - Springer
Mobile application markets such as the Android Marketplace provide a centralized
showcase of applications that end users can purchase or download for free onto their mobile …

Apex: extending android permission model and enforcement with user-defined runtime constraints

M Nauman, S Khan, X Zhang - Proceedings of the 5th ACM symposium …, 2010 - dl.acm.org
Android is the first mass-produced consumer-market open source mobile platform that
allows developers to easily create applications and users to readily install them. However …

To update or not to update: Insights from a two-year study of android app evolution

VF Taylor, I Martinovic - Proceedings of the 2017 ACM on Asia …, 2017 - dl.acm.org
Although there are over 1,900,000 third-party Android apps in the Google Play Store, little is
understood about how their security and privacy characteristics, such as dangerous …