Static analysis of android apps: A systematic literature review
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …
often traversing program paths to check some program properties. Static analysis …
Challenges for static analysis of java reflection-literature review and empirical study
D Landman, A Serebrenik… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
The behavior of software that uses the Java Reflection API is fundamentally hard to predict
by analyzing code. Only recent static analysis approaches can resolve reflection under …
by analyzing code. Only recent static analysis approaches can resolve reflection under …
Droidra: Taming reflection to support whole-program analysis of android apps
Android developers heavily use reflection in their apps for legitimate reasons, but also
significantly for hiding malicious actions. Unfortunately, current state-of-the-art static analysis …
significantly for hiding malicious actions. Unfortunately, current state-of-the-art static analysis …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
Collusive data leak and more: Large-scale threat analysis of inter-app communications
Inter-Component Communication (ICC) provides a message passing mechanism for data
exchange between Android applications. It has been long believed that inter-app ICCs can …
exchange between Android applications. It has been long believed that inter-app ICCs can …
Cross-app interference threats in smart homes: Categorization, detection and handling
Internet of Thing platforms prosper home automation applications (apps). Prior research
concerns intra-app security. Our work reveals that automation apps, even secured …
concerns intra-app security. Our work reveals that automation apps, even secured …
A formal approach for detection of security flaws in the android permission system
The ever increasing expansion of mobile applications into nearly every aspect of modern
life, from banking to healthcare systems, is making their security more important than ever …
life, from banking to healthcare systems, is making their security more important than ever …
Android security assessment: A review, taxonomy and research gap study
Security threats are escalating exponentially posing a serious challenge to mobile platforms,
specifically Android. In recent years the number of attacks has not only increased but each …
specifically Android. In recent years the number of attacks has not only increased but each …
Taming reflection: An essential step toward whole-program analysis of android apps
Android developers heavily use reflection in their apps for legitimate reasons. However,
reflection is also significantly used for hiding malicious actions. Unfortunately, current state …
reflection is also significantly used for hiding malicious actions. Unfortunately, current state …
Identifying mobile inter-app communication risks
Malware collusion is a technique utilized by attackers to evade standard detection. It is a
new threat where two or more applications, appearing benign, communicate to perform a …
new threat where two or more applications, appearing benign, communicate to perform a …