A survey of app store analysis for software engineering

W Martin, F Sarro, Y Jia, Y Zhang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
App Store Analysis studies information about applications obtained from app stores. App
stores provide a wealth of information derived from users that would not exist had the …

Identifying security issues for mobile applications based on user review summarization

C Tao, H Guo, Z Huang - Information and Software Technology, 2020 - Elsevier
Context With the development of mobile apps, public concerns about security issues are
continually rising. From the user's perspective, it is crucial to be aware of the security issues …

[HTML][HTML] Structural analysis and detection of android botnets using machine learning techniques

G Kirubavathi, R Anitha - International Journal of Information Security, 2018 - Springer
Nowadays, smartphone devices are an integral part of our lives since they enable us to
access a large variety of services from personal to banking. The worldwide popularity and …

Screening smartphone applications using malware family signatures

J Lee, S Lee, H Lee - computers & security, 2015 - Elsevier
The sharp increase in smartphone malware has become one of the most serious security
problems. Since the Android platform has taken the dominant position in smartphone …

Android 权限机制安全研究综述.

朱佳伟, 喻梁文, 关志, 陈钟 - Application Research of …, 2015 - search.ebscohost.com
总结了目前针对Android 权限机制相关的研究工作, 说明了Android 权限机制的实现原理,
并从Android 权限机制有效性分析, Android 权限机制改进方案, 以及利用权限这个重要的安全 …

[PDF][PDF] Permission-based malware detection mechanisms on android: analysis and perspectives

F Tchakounté - Journal of Computer Science, 2014 - researchgate.net
Android security has been built upon a permission-based mechanism which restricts
accesses of third-party Android applications to critical resources on an Android device. The …

[HTML][HTML] A comprehensive review on permissions-based Android malware detection

Y Sharma, A Arora - International Journal of Information Security, 2024 - Springer
The first Android-ready “G1” phone debuted in late October 2008. Since then, the growth of
Android malware has been explosive, analogous to the rise in the popularity of Android. The …

Automatic detection for privacy violations in Android Applications

Q Luo, Y Yu, J Liu, A Benslimane - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
While providing significant convenience for people, mobile applications (Apps) bring serious
privacy leakage and invasion threats over certain platforms (eg, Android) due to privacy …

[引用][C] Android 安全研究进展

卿斯汉 - 软件学报, 2016

Android malware detection based on permission combinations

Z Liu, Y Lai, Y Chen - International Journal of Simulation …, 2015 - inderscienceonline.com
Considering the resource limitations of mobile terminals, such as memory capacity and
battery power, it will take a large portion of resources if the complex malicious detection …