Securing android: a survey, taxonomy, and challenges
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …
on Android. However, Android's widespread adoption is marred with increasingly rampant …
[PDF][PDF] Information flow analysis of android applications in droidsafe.
We present DroidSafe, a static information flow analysis tool that reports potential leaks of
sensitive information in Android applications. DroidSafe combines a comprehensive …
sensitive information in Android applications. DroidSafe combines a comprehensive …
Appcontext: Differentiating malicious and benign mobile app behaviors using context
Mobile malware attempts to evade detection during app analysis by mimicking security-
sensitive behaviors of benign apps that provide similar functionality (eg, sending SMS …
sensitive behaviors of benign apps that provide similar functionality (eg, sending SMS …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
EveDroid: Event-aware Android malware detection against model degrading for IoT devices
With the proliferation of the smart Internet of Things (IoT) devices based on Android system,
malicious Android applications targeting for IoT devices have received more and more …
malicious Android applications targeting for IoT devices have received more and more …
MalPat: Mining patterns of malicious and benign Android apps via permission-related APIs
The dramatic rise of Android application (app) marketplaces has significantly gained the
success of convenience for mobile users. Consequently, with the advantage of numerous …
success of convenience for mobile users. Consequently, with the advantage of numerous …
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
It is reported recently that legitimate libraries are repackaged for propagating malware. An in-
depth analysis of such potentially-harmful libraries (PhaLibs), however, has never been …
depth analysis of such potentially-harmful libraries (PhaLibs), however, has never been …
Privacyguard: A vpn-based platform to detect information leakage on android devices
Y Song, U Hengartner - Proceedings of the 5th Annual ACM CCS …, 2015 - dl.acm.org
More and more people rely on mobile devices to access the Internet, which also increases
the amount of private information that can be gathered from people's devices. Although …
the amount of private information that can be gathered from people's devices. Although …
[PDF][PDF] A Survey of Android Security Threats and Defenses.
With billions of people using smartphones and the exponential growth of smartphone apps,
it is prohibitive for app marketplaces, such as Google App Store, to thoroughly verify if an …
it is prohibitive for app marketplaces, such as Google App Store, to thoroughly verify if an …
HornDroid: Practical and sound static analysis of Android applications by SMT solving
S Calzavara, I Grishchenko… - 2016 IEEE European …, 2016 - ieeexplore.ieee.org
We present HornDroid, a new tool for the static analysis of information flow properties in
Android applications. The core idea underlying HornDroid is to use Horn clauses for soundly …
Android applications. The core idea underlying HornDroid is to use Horn clauses for soundly …