Securing android: a survey, taxonomy, and challenges

Sufatrio, DJJ Tan, TW Chua, VLL Thing - ACM Computing Surveys …, 2015 - dl.acm.org
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …

[PDF][PDF] Information flow analysis of android applications in droidsafe.

MI Gordon, D Kim, JH Perkins, L Gilham, N Nguyen… - NDSS, 2015 - people.csail.mit.edu
We present DroidSafe, a static information flow analysis tool that reports potential leaks of
sensitive information in Android applications. DroidSafe combines a comprehensive …

Appcontext: Differentiating malicious and benign mobile app behaviors using context

W Yang, X Xiao, B Andow, S Li, T Xie… - 2015 IEEE/ACM 37th …, 2015 - ieeexplore.ieee.org
Mobile malware attempts to evade detection during app analysis by mimicking security-
sensitive behaviors of benign apps that provide similar functionality (eg, sending SMS …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

EveDroid: Event-aware Android malware detection against model degrading for IoT devices

T Lei, Z Qin, Z Wang, Q Li, D Ye - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
With the proliferation of the smart Internet of Things (IoT) devices based on Android system,
malicious Android applications targeting for IoT devices have received more and more …

MalPat: Mining patterns of malicious and benign Android apps via permission-related APIs

G Tao, Z Zheng, Z Guo, MR Lyu - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The dramatic rise of Android application (app) marketplaces has significantly gained the
success of convenience for mobile users. Consequently, with the advantage of numerous …

Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios

K Chen, X Wang, Y Chen, P Wang… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
It is reported recently that legitimate libraries are repackaged for propagating malware. An in-
depth analysis of such potentially-harmful libraries (PhaLibs), however, has never been …

Privacyguard: A vpn-based platform to detect information leakage on android devices

Y Song, U Hengartner - Proceedings of the 5th Annual ACM CCS …, 2015 - dl.acm.org
More and more people rely on mobile devices to access the Internet, which also increases
the amount of private information that can be gathered from people's devices. Although …

[PDF][PDF] A Survey of Android Security Threats and Defenses.

B Rashidi, CJ Fung - J. Wirel. Mob. Networks Ubiquitous Comput …, 2015 - isyou.info
With billions of people using smartphones and the exponential growth of smartphone apps,
it is prohibitive for app marketplaces, such as Google App Store, to thoroughly verify if an …

HornDroid: Practical and sound static analysis of Android applications by SMT solving

S Calzavara, I Grishchenko… - 2016 IEEE European …, 2016 - ieeexplore.ieee.org
We present HornDroid, a new tool for the static analysis of information flow properties in
Android applications. The core idea underlying HornDroid is to use Horn clauses for soundly …