Android source code vulnerability detection: a systematic literature review

J Senanayake, H Kalutarage, MO Al-Kadri… - ACM Computing …, 2023 - dl.acm.org
The use of mobile devices is rising daily in this technological era. A continuous and
increasing number of mobile applications are constantly offered on mobile marketplaces to …

Penetration frameworks and development issues in secure mobile application development: A systematic literature review

IU Haq, TA Khan - IEEE Access, 2021 - ieeexplore.ieee.org
The invention of smartphones has opened a new market for mobile application
development. Amateur android app developers often do not possess knowledge of the latest …

Understanding the evolution of android app vulnerabilities

J Gao, L Li, P Kong, TF Bissyandé… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The Android ecosystem today is a growing universe of a few billion devices, hundreds of
millions of users and millions of applications targeting a wide range of activities where …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Android security assessment: A review, taxonomy and research gap study

S Garg, N Baliyan - Computers & Security, 2021 - Elsevier
Security threats are escalating exponentially posing a serious challenge to mobile platforms,
specifically Android. In recent years the number of attacks has not only increased but each …

[Retracted] A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis

S Acharya, U Rawat… - Security and …, 2022 - Wiley Online Library
The popularity and open‐source nature of Android devices have resulted in a dramatic
growth of Android malware. Malware developers are also able to evade the detection …

* droid: Assessment and evaluation of android application analysis tools

B Reaves, J Bowers, SA Gorski III, O Anise… - ACM Computing …, 2016 - dl.acm.org
The security research community has invested significant effort in improving the security of
Android applications over the past half decade. This effort has addressed a wide range of …

[图书][B] Android hacker's handbook

JJ Drake, Z Lanier, C Mulliner, PO Fora, SA Ridley… - 2014 - books.google.com
The first comprehensive guide to discovering and preventing attacks on the Android OS As
the Android operating system continues to increase its share of the smartphone market …

Vulnerability detection in recent Android apps: An empirical study

FH Shezan, SF Afroze, A Iqbal - 2017 International Conference …, 2017 - ieeexplore.ieee.org
With the continuous and rapid increase in quantity and diversity of Smartphone application
usage, the storage of sensitive personal and even financial information of the users is also …

An empirical study of android security bulletins in different vendors

S Farhang, MB Kirdan, A Laszka… - Proceedings of The Web …, 2020 - dl.acm.org
Mobile devices encroach on almost every part of our lives, including work and leisure, and
contain a wealth of personal and sensitive information. It is, therefore, imperative that these …