Android mobile applications vulnerabilities and prevention methods: A review

H Abdullah, SRM Zeebaree - … To Enhance e-learning and Other …, 2021 - ieeexplore.ieee.org
The popularity of mobile applications is rapidly increasing in the age of smartphones and
tablets. Communication, social media, news, sending emails, buying, paying, viewing …

SensDroid: analysis for malicious activity risk of Android application

G Shrivastava, P Kumar - Multimedia Tools and Applications, 2019 - Springer
In Android, the inter-communication structure is governed by a late runtime binding message
called Intent. Intents are having rich features which can detect the true nature of malware …

MEGDroid: A model-driven event generation framework for dynamic android malware analysis

H Hasan, BT Ladani, B Zamani - Information and Software Technology, 2021 - Elsevier
Context The tremendous growth of Android malware in recent years is a strong motivation
for the vast endeavor in detection and analysis of malware apps. A prominent approach for …

On manually reverse engineering communication protocols of linux-based iot systems

K Liu, M Yang, Z Ling, H Yan, Y Zhang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
IoT security and privacy has raised grave concerns. Efforts have been made to design tools
to identify and understand vulnerabilities of IoT systems. Most of the existing protocol …

Static analysis of Android Auto infotainment and on‐board diagnostics II apps

AK Mandal, F Panarotto, A Cortesi… - Software: Practice …, 2019 - Wiley Online Library
Smartphone and automotive technologies are rapidly converging, letting drivers enjoy
communication and infotainment facilities and monitor in‐vehicle functionalities, via on …

A model‐based framework for inter‐app Vulnerability analysis of Android applications

A Nirumand, B Zamani, B Tork‐Ladani… - Software: Practice …, 2023 - Wiley Online Library
Android users install various apps, such as banking apps, on their smart devices dealing
with user‐sensitive information. The Android framework, via Inter‐Component …

Android application behavioural analysis for data leakage

G Shrivastava, P Kumar - Expert Systems, 2021 - Wiley Online Library
An android application requires specific permissions from the user to access the system
resources and perform required functionalities. Recently, the android market has …

Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques

M Deverashetti, K Ranjitha, KV Pradeepthi - Journal of Information Security …, 2022 - Elsevier
There have been many incidents in the past, where user's private information, health and
vitals, shared to a mobile app have been disclosed. In this paper, we consider Menstruation …

Software engineering techniques for statically analyzing mobile apps: research trends, characteristics, and potential for industrial adoption

M Autili, I Malavolta, A Perucci, GL Scoccia… - Journal of Internet …, 2021 - Springer
Mobile platforms are rapidly and continuously changing, with support for new sensors, APIs,
and programming abstractions. Static analysis is gaining a growing interest, allowing …

Maaker: A framework for detecting and defeating evasion techniques in Android malware

H Hasan, BT Ladani, B Zamani - Journal of Information Security and …, 2023 - Elsevier
Dynamic analysis is a prominent approach for understanding the real-behavior of Android
malware. Malware mainly use evasions to underperform dynamic analysis. Although …