Combining static analysis with probabilistic models to enable market-scale android inter-component analysis
Static analysis has been successfully used in many areas, from verifying mission-critical
software to malware detection. Unfortunately, static analysis often produces false positives …
software to malware detection. Unfortunately, static analysis often produces false positives …
Understanding open ports in Android applications: Discovery, diagnosis, and security assessment
Open TCP/UDP ports are traditionally used by servers to provide application services, but
they are also found in many Android apps. In this paper, we present the first open-port …
they are also found in many Android apps. In this paper, we present the first open-port …
When program analysis meets bytecode search: Targeted and efficient inter-procedural analysis of modern Android apps in BackDroid
Widely-used Android static program analysis tools, eg, Amandroid and FlowDroid, perform
the whole-app inter-procedural analysis that is comprehensive but fundamentally difficult to …
the whole-app inter-procedural analysis that is comprehensive but fundamentally difficult to …
Measuring the declared SDK versions and their consistency with API calls in Android apps
Android has been the most popular smartphone system, with multiple platform versions (eg,
KITKAT and Lollipop) active in the market. To manage the application's compatibility with …
KITKAT and Lollipop) active in the market. To manage the application's compatibility with …
Attacking android smartphone systems without permissions
Android requires third-party applications to request for permissions when they access critical
mobile resources, such as users' personal information and system operations. In this paper …
mobile resources, such as users' personal information and system operations. In this paper …
Scalable online vetting of Android apps for measuring declared SDK versions and their consistency with API calls
Android has been the most popular smartphone system with multiple platform versions
active in the market. To manage the application's compatibility with one or more platform …
active in the market. To manage the application's compatibility with one or more platform …
Seccomp: Towards practically defending against component hijacking in android applications
Cross-app collaboration via inter-component communication is a fundamental mechanism
on Android. Although it brings the benefits such as functionality reuse and data sharing, a …
on Android. Although it brings the benefits such as functionality reuse and data sharing, a …
[PDF][PDF] Vulnerabilities Classification for Safe Development on Android
R Ferreira, AFP dos Santos… - Journal of Information …, 2016 - pdfs.semanticscholar.org
The global sales market is currently led by devices with the Android operating system. In
2015, more than 1 billion smartphones were sold, of which 81.5% were operated by the …
2015, more than 1 billion smartphones were sold, of which 81.5% were operated by the …
[PDF][PDF] Renforcement formel et automatique de politiques de sécurité dans des applications Android par réécriture
M Ziadia - 2022 - core.ac.uk
Résumé Autant les applications Android ont réussi à positionner Android parmi les
systèmes d'exploitation les plus utilisés, autant elles ont facilité aux créateurs de maliciels …
systèmes d'exploitation les plus utilisés, autant elles ont facilité aux créateurs de maliciels …
Uma Uma Técnica Prognóstica para Desenvolvimento Seguro de Aplicativo Android
RLDM Ferreira, AFP dos Santos… - Journal on Advances in …, 2017 - revista.univem.edu.br
Searching for vulnerabilities in Android apps through approaches based on the app's dex
bytecode has been applied to a lot of researches. This approach, called late detection, is …
bytecode has been applied to a lot of researches. This approach, called late detection, is …