Automated testing of android apps: A systematic literature review

P Kong, L Li, J Gao, K Liu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Automated testing of Android apps is essential for app users, app developers, and market
maintainer communities alike. Given the widespread adoption of Android and the …

Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

Deep feature extraction and classification of android malware images

J Singh, D Thakur, F Ali, T Gera, KS Kwak - Sensors, 2020 - mdpi.com
The Android operating system has gained popularity and evolved rapidly since the previous
decade. Traditional approaches such as static and dynamic malware identification …

Systematic survey of mobile payments, protocols, and security infrastructure

S Bojjagani, VN Sastry, CM Chen, S Kumari… - Journal of Ambient …, 2023 - Springer
Mobile payments makeup one of the fastest-growing mobile services available today and
are widely used by smartphones for utility payments, bill payments, and online shopping …

Ec2: Ensemble clustering and classification for predicting android malware families

T Chakraborty, F Pierazzi… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
As the most widely used mobile platform, Android is also the biggest target for mobile
malware. Given the increasing number of Android malware variants, detecting malware …

Constructing features for detecting android malicious applications: issues, taxonomy and directions

W Wang, M Zhao, Z Gao, G Xu, H Xian, Y Li… - IEEE …, 2019 - ieeexplore.ieee.org
The number of applications (apps) available for smart devices or Android based IoT (Internet
of Things) has surged dramatically over the past few years. Meanwhile, the volume of ill …

Classification and analysis of android malware images using feature fusion technique

J Singh, D Thakur, T Gera, B Shah, T Abuhmed… - IEEE …, 2021 - ieeexplore.ieee.org
The super packed functionalities and artificial intelligence (AI)-powered applications have
made the Android operating system a big player in the market. Android smartphones have …

Analyzing the analyzers: Flowdroid/iccta, amandroid, and droidsafe

L Qiu, Y Wang, J Rubin - Proceedings of the 27th ACM SIGSOFT …, 2018 - dl.acm.org
Numerous static analysis techniques have recently been proposed for identifying
information flows in mobile applications. These techniques are compared to each other …

Research on third-party libraries in android apps: A taxonomy and systematic literature review

X Zhan, T Liu, L Fan, L Li, S Chen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Third-party libraries (TPLs) have been widely used in mobile apps, which play an essential
part in the entire Android ecosystem. However, TPL is a double-edged sword. On the one …

A survey of performance optimization for mobile applications

M Hort, M Kechagia, F Sarro… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
To ensure user satisfaction and success of mobile applications, it is important to provide
highly performant applications. This is particularly important for resource-constrained …