Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

Challenges for static analysis of java reflection-literature review and empirical study

D Landman, A Serebrenik… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
The behavior of software that uses the Java Reflection API is fundamentally hard to predict
by analyzing code. Only recent static analysis approaches can resolve reflection under …

Droidra: Taming reflection to support whole-program analysis of android apps

L Li, TF Bissyandé, D Octeau, J Klein - Proceedings of the 25th …, 2016 - dl.acm.org
Android developers heavily use reflection in their apps for legitimate reasons, but also
significantly for hiding malicious actions. Unfortunately, current state-of-the-art static analysis …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Collusive data leak and more: Large-scale threat analysis of inter-app communications

A Bosu, F Liu, D Yao, G Wang - Proceedings of the 2017 ACM on Asia …, 2017 - dl.acm.org
Inter-Component Communication (ICC) provides a message passing mechanism for data
exchange between Android applications. It has been long believed that inter-app ICCs can …

Cross-app interference threats in smart homes: Categorization, detection and handling

H Chi, Q Zeng, X Du, J Yu - 2020 50th Annual IEEE/IFIP …, 2020 - ieeexplore.ieee.org
Internet of Thing platforms prosper home automation applications (apps). Prior research
concerns intra-app security. Our work reveals that automation apps, even secured …

A formal approach for detection of security flaws in the android permission system

H Bagheri, E Kang, S Malek, D Jackson - Formal Aspects of Computing, 2018 - Springer
The ever increasing expansion of mobile applications into nearly every aspect of modern
life, from banking to healthcare systems, is making their security more important than ever …

Android security assessment: A review, taxonomy and research gap study

S Garg, N Baliyan - Computers & Security, 2021 - Elsevier
Security threats are escalating exponentially posing a serious challenge to mobile platforms,
specifically Android. In recent years the number of attacks has not only increased but each …

Taming reflection: An essential step toward whole-program analysis of android apps

X Sun, L Li, TF Bissyandé, J Klein, D Octeau… - ACM Transactions on …, 2021 - dl.acm.org
Android developers heavily use reflection in their apps for legitimate reasons. However,
reflection is also significantly used for hiding malicious actions. Unfortunately, current state …

Identifying mobile inter-app communication risks

KO Elish, H Cai, D Barton, D Yao… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Malware collusion is a technique utilized by attackers to evade standard detection. It is a
new threat where two or more applications, appearing benign, communicate to perform a …