Software vulnerability prediction: A systematic mapping study

I Kalouptsoglou, M Siavvas, A Ampatzoglou… - Information and …, 2023 - Elsevier
Context: Software security is considered a major aspect of software quality as the number of
discovered vulnerabilities in software products is growing. Vulnerability prediction is a …

[HTML][HTML] Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses

Z Muhammad, Z Anwar, AR Javed, B Saleem, S Abbas… - Technologies, 2023 - mdpi.com
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …

Llbezpeky: Leveraging large language models for vulnerability detection

NS Mathews, Y Brus, Y Aafer, M Nagappan… - arXiv preprint arXiv …, 2024 - arxiv.org
Despite the continued research and progress in building secure systems, Android
applications continue to be ridden with vulnerabilities, necessitating effective detection …

Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin

J Senanayake, H Kalutarage, MO Al-Kadri… - IFIP Annual Conference …, 2023 - Springer
During Android application development, ensuring adequate security is a crucial and
intricate aspect. However, many applications are released without adequate security …

Ai-powered vulnerability detection for secure source code development

S Rajapaksha, J Senanayake, H Kalutarage… - International Conference …, 2022 - Springer
Vulnerable source code in software applications is causing paramount reliability and
security issues. Software security principles should be integrated to reduce these issues at …

Dynamic Security Analysis on Android: A Systematic Literature Review

T Sutter, T Kehrer, M Rennhard, B Tellenbach… - IEEE …, 2024 - ieeexplore.ieee.org
Dynamic analysis is a technique that is used to fully understand the internals of a system at
runtime. On Android, dynamic security analysis involves real-time assessment and active …

A Large-scale Investigation of Semantically Incompatible APIs behind Compatibility Issues in Android Apps

S Pan, T Guo, L Zhang, P Liu, Z Xing, X Sun - arXiv preprint arXiv …, 2024 - arxiv.org
Application Programming Interface (API) incompatibility is a long-standing issue in Android
application development. The rapid evolution of Android APIs results in a significant number …

A cosine similarity-based labeling technique for vulnerability type detection using source codes

MM Öztürk - Computers & Security, 2024 - Elsevier
Vulnerability detection is of great importance in providing reliability to software systems.
Although existing methods achieve remarkable success in vulnerability detection, they have …

Green disposal of waste smartphone protective film: Efficiency, mechanism, bench-scale test and secondary waste reutilization

J Chen, S Ding, C Gao, C Chen, T An - Journal of Environmental Sciences, 2025 - Elsevier
The manufacture and obsolescence of smartphones produce numerous waste plastic
accessories (eg, waste smartphone protective film (WSPF)), possessing immense potential …

[HTML][HTML] Enhancing mobile security through comprehensive penetration testing

M Roshanaei - Journal of Information Security, 2024 - scirp.org
In today's era, where mobile devices have become an integral part of our daily lives,
ensuring the security of mobile applications has become increasingly crucial. Mobile …