Combining static analysis with probabilistic models to enable market-scale android inter-component analysis

D Octeau, S Jha, M Dering, P McDaniel… - Proceedings of the 43rd …, 2016 - dl.acm.org
Static analysis has been successfully used in many areas, from verifying mission-critical
software to malware detection. Unfortunately, static analysis often produces false positives …

Understanding open ports in Android applications: Discovery, diagnosis, and security assessment

D Wu, D Gao, RKC Chang, E He, EKT Cheng… - 2019 - ink.library.smu.edu.sg
Open TCP/UDP ports are traditionally used by servers to provide application services, but
they are also found in many Android apps. In this paper, we present the first open-port …

When program analysis meets bytecode search: Targeted and efficient inter-procedural analysis of modern Android apps in BackDroid

D Wu, D Gao, RH Deng, CR KC - 2021 51st Annual IEEE/IFIP …, 2021 - ieeexplore.ieee.org
Widely-used Android static program analysis tools, eg, Amandroid and FlowDroid, perform
the whole-app inter-procedural analysis that is comprehensive but fundamentally difficult to …

Measuring the declared SDK versions and their consistency with API calls in Android apps

D Wu, X Liu, J Xu, D Lo, D Gao - … , WASA 2017, Guilin, China, June 19-21 …, 2017 - Springer
Android has been the most popular smartphone system, with multiple platform versions (eg,
KITKAT and Lollipop) active in the market. To manage the application's compatibility with …

Attacking android smartphone systems without permissions

SM Kywe, Y Li, K Petal, M Grace - 2016 14th Annual …, 2016 - ieeexplore.ieee.org
Android requires third-party applications to request for permissions when they access critical
mobile resources, such as users' personal information and system operations. In this paper …

Scalable online vetting of Android apps for measuring declared SDK versions and their consistency with API calls

D Wu, D Gao, D Lo - Empirical Software Engineering, 2021 - Springer
Android has been the most popular smartphone system with multiple platform versions
active in the market. To manage the application's compatibility with one or more platform …

Seccomp: Towards practically defending against component hijacking in android applications

D Wu, D Gao, Y Li, RH Deng - arXiv preprint arXiv:1609.03322, 2016 - arxiv.org
Cross-app collaboration via inter-component communication is a fundamental mechanism
on Android. Although it brings the benefits such as functionality reuse and data sharing, a …

[PDF][PDF] Vulnerabilities Classification for Safe Development on Android

R Ferreira, AFP dos Santos… - Journal of Information …, 2016 - pdfs.semanticscholar.org
The global sales market is currently led by devices with the Android operating system. In
2015, more than 1 billion smartphones were sold, of which 81.5% were operated by the …

[PDF][PDF] Renforcement formel et automatique de politiques de sécurité dans des applications Android par réécriture

M Ziadia - 2022 - core.ac.uk
Résumé Autant les applications Android ont réussi à positionner Android parmi les
systèmes d'exploitation les plus utilisés, autant elles ont facilité aux créateurs de maliciels …

Uma Uma Técnica Prognóstica para Desenvolvimento Seguro de Aplicativo Android

RLDM Ferreira, AFP dos Santos… - Journal on Advances in …, 2017 - revista.univem.edu.br
Searching for vulnerabilities in Android apps through approaches based on the app's dex
bytecode has been applied to a lot of researches. This approach, called late detection, is …