A survey of app store analysis for software engineering
App Store Analysis studies information about applications obtained from app stores. App
stores provide a wealth of information derived from users that would not exist had the …
stores provide a wealth of information derived from users that would not exist had the …
Identifying security issues for mobile applications based on user review summarization
C Tao, H Guo, Z Huang - Information and Software Technology, 2020 - Elsevier
Context With the development of mobile apps, public concerns about security issues are
continually rising. From the user's perspective, it is crucial to be aware of the security issues …
continually rising. From the user's perspective, it is crucial to be aware of the security issues …
[HTML][HTML] Structural analysis and detection of android botnets using machine learning techniques
G Kirubavathi, R Anitha - International Journal of Information Security, 2018 - Springer
Nowadays, smartphone devices are an integral part of our lives since they enable us to
access a large variety of services from personal to banking. The worldwide popularity and …
access a large variety of services from personal to banking. The worldwide popularity and …
Screening smartphone applications using malware family signatures
J Lee, S Lee, H Lee - computers & security, 2015 - Elsevier
The sharp increase in smartphone malware has become one of the most serious security
problems. Since the Android platform has taken the dominant position in smartphone …
problems. Since the Android platform has taken the dominant position in smartphone …
Android 权限机制安全研究综述.
朱佳伟, 喻梁文, 关志, 陈钟 - Application Research of …, 2015 - search.ebscohost.com
总结了目前针对Android 权限机制相关的研究工作, 说明了Android 权限机制的实现原理,
并从Android 权限机制有效性分析, Android 权限机制改进方案, 以及利用权限这个重要的安全 …
并从Android 权限机制有效性分析, Android 权限机制改进方案, 以及利用权限这个重要的安全 …
[PDF][PDF] Permission-based malware detection mechanisms on android: analysis and perspectives
F Tchakounté - Journal of Computer Science, 2014 - researchgate.net
Android security has been built upon a permission-based mechanism which restricts
accesses of third-party Android applications to critical resources on an Android device. The …
accesses of third-party Android applications to critical resources on an Android device. The …
[HTML][HTML] A comprehensive review on permissions-based Android malware detection
The first Android-ready “G1” phone debuted in late October 2008. Since then, the growth of
Android malware has been explosive, analogous to the rise in the popularity of Android. The …
Android malware has been explosive, analogous to the rise in the popularity of Android. The …
Automatic detection for privacy violations in Android Applications
While providing significant convenience for people, mobile applications (Apps) bring serious
privacy leakage and invasion threats over certain platforms (eg, Android) due to privacy …
privacy leakage and invasion threats over certain platforms (eg, Android) due to privacy …
Android malware detection based on permission combinations
Considering the resource limitations of mobile terminals, such as memory capacity and
battery power, it will take a large portion of resources if the complex malicious detection …
battery power, it will take a large portion of resources if the complex malicious detection …