The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

A survey of android application and malware hardening

V Sihag, M Vardhan, P Singh - Computer Science Review, 2021 - Elsevier
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …

Reliable third-party library detection in android and its security applications

M Backes, S Bugiel, E Derr - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Third-party libraries on Android have been shown to be security and privacy hazards by
adding security vulnerabilities to their host apps or by misusing inherited access rights …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Rebooting research on detecting repackaged android apps: Literature review and benchmark

L Li, TF Bissyandé, J Klein - IEEE Transactions on Software …, 2019 - ieeexplore.ieee.org
Repackaging is a serious threat to the Android ecosystem as it deprives app developers of
their benefits, contributes to spreading malware on users' devices, and increases the …

Toward engineering a secure android ecosystem: A survey of existing techniques

M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng… - ACM Computing …, 2016 - dl.acm.org
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …

Detecting third-party libraries in android applications with high precision and recall

Y Zhang, J Dai, X Zhang, S Huang… - 2018 IEEE 25th …, 2018 - ieeexplore.ieee.org
Third-party libraries are widely used in Android applications to ease development and
enhance functionalities. However, the incorporated libraries also bring new security & …

DroidEagle: Seamless detection of visually similar Android apps

M Sun, M Li, JCS Lui - Proceedings of the 8th ACM Conference on …, 2015 - dl.acm.org
Repackaged malware and phishing malware consist 86%[35] of all Android malware, and
they significantly affect the Android ecosystem. Previous work use disassembled Dalvik …

{LibScan}: Towards more precise {Third-Party} library identification for android applications

Y Wu, C Sun, D Zeng, G Tan, S Ma… - 32nd USENIX Security …, 2023 - usenix.org
Android apps pervasively use third-party libraries (TPL) to reuse functionalities and improve
development efficiency. The insufficient knowledge of the TPL internal exposes the …

CodeMatch: obfuscation won't conceal your repackaged app

L Glanz, S Amann, M Eichberg, M Reif… - Proceedings of the …, 2017 - dl.acm.org
An established way to steal the income of app developers, or to trick users into installing
malware, is the creation of repackaged apps. These are clones of-typically-successful apps …