Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

Securing android: a survey, taxonomy, and challenges

Sufatrio, DJJ Tan, TW Chua, VLL Thing - ACM Computing Surveys …, 2015 - dl.acm.org
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …

Iccta: Detecting inter-component privacy leaks in android apps

L Li, A Bartel, TF Bissyandé, J Klein… - 2015 IEEE/ACM 37th …, 2015 - ieeexplore.ieee.org
Shake Them All is a popular" Wallpaper" application exceeding millions of downloads on
Google Play. At installation, this application is given permission to (1) access the Internet (for …

You get where you're looking for: The impact of information sources on code security

Y Acar, M Backes, S Fahl, D Kim… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Vulnerabilities in Android code--including but not limited to insecure data storage,
unprotected inter-component communication, broken TLS implementations, and violations of …

Taming android fragmentation: Characterizing and detecting compatibility issues for android apps

L Wei, Y Liu, SC Cheung - Proceedings of the 31st IEEE/ACM …, 2016 - dl.acm.org
Android ecosystem is heavily fragmented. The numerous combinations of different device
models and operating system versions make it impossible for Android app developers to …

Beyond google play: A large-scale comparative study of chinese android app markets

H Wang, Z Liu, J Liang, N Vallina-Rodriguez… - Proceedings of the …, 2018 - dl.acm.org
China is one of the largest Android markets in the world. As Chinese users cannot access
Google Play to buy and install Android apps, a number of independent app stores have …

Taintart: A practical multi-level information-flow tracking system for android runtime

M Sun, T Wei, JCS Lui - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Mobile operating systems like Android failed to provide sufficient protection on personal
data, and privacy leakage becomes a major concern. To understand the security risks and …

Cid: Automating the detection of api-related compatibility issues in android apps

L Li, TF Bissyandé, H Wang, J Klein - Proceedings of the 27th ACM …, 2018 - dl.acm.org
The Android Application Programming Interface provides the necessary building blocks for
app developers to harness the functionalities of the Android devices, including for interacting …

Your voice assistant is mine: How to abuse speakers to steal information and control your phone

W Diao, X Liu, Z Zhou, K Zhang - Proceedings of the 4th ACM Workshop …, 2014 - dl.acm.org
Previous research about sensor based attacks on Android platform focused mainly on
accessing or controlling over sensitive components, such as camera, microphone and GPS …

The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …