Static analysis of android apps: A systematic literature review
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …
often traversing program paths to check some program properties. Static analysis …
Securing android: a survey, taxonomy, and challenges
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …
on Android. However, Android's widespread adoption is marred with increasingly rampant …
Iccta: Detecting inter-component privacy leaks in android apps
Shake Them All is a popular" Wallpaper" application exceeding millions of downloads on
Google Play. At installation, this application is given permission to (1) access the Internet (for …
Google Play. At installation, this application is given permission to (1) access the Internet (for …
You get where you're looking for: The impact of information sources on code security
Vulnerabilities in Android code--including but not limited to insecure data storage,
unprotected inter-component communication, broken TLS implementations, and violations of …
unprotected inter-component communication, broken TLS implementations, and violations of …
Taming android fragmentation: Characterizing and detecting compatibility issues for android apps
Android ecosystem is heavily fragmented. The numerous combinations of different device
models and operating system versions make it impossible for Android app developers to …
models and operating system versions make it impossible for Android app developers to …
Beyond google play: A large-scale comparative study of chinese android app markets
H Wang, Z Liu, J Liang, N Vallina-Rodriguez… - Proceedings of the …, 2018 - dl.acm.org
China is one of the largest Android markets in the world. As Chinese users cannot access
Google Play to buy and install Android apps, a number of independent app stores have …
Google Play to buy and install Android apps, a number of independent app stores have …
Taintart: A practical multi-level information-flow tracking system for android runtime
Mobile operating systems like Android failed to provide sufficient protection on personal
data, and privacy leakage becomes a major concern. To understand the security risks and …
data, and privacy leakage becomes a major concern. To understand the security risks and …
Cid: Automating the detection of api-related compatibility issues in android apps
The Android Application Programming Interface provides the necessary building blocks for
app developers to harness the functionalities of the Android devices, including for interacting …
app developers to harness the functionalities of the Android devices, including for interacting …
Your voice assistant is mine: How to abuse speakers to steal information and control your phone
Previous research about sensor based attacks on Android platform focused mainly on
accessing or controlling over sensitive components, such as camera, microphone and GPS …
accessing or controlling over sensitive components, such as camera, microphone and GPS …
The role of the adversary model in applied security research
Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …
schemes or protocols. However, their use in other computer science research disciplines is …