Securing android: a survey, taxonomy, and challenges

Sufatrio, DJJ Tan, TW Chua, VLL Thing - ACM Computing Surveys …, 2015 - dl.acm.org
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …

Research on third-party libraries in android apps: A taxonomy and systematic literature review

X Zhan, T Liu, L Fan, L Li, S Chen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Third-party libraries (TPLs) have been widely used in mobile apps, which play an essential
part in the entire Android ecosystem. However, TPL is a double-edged sword. On the one …

Reliable third-party library detection in android and its security applications

M Backes, S Bugiel, E Derr - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Third-party libraries on Android have been shown to be security and privacy hazards by
adding security vulnerabilities to their host apps or by misusing inherited access rights …

Delegate the smartphone user? Security awareness in smartphone platforms

A Mylonas, A Kastania, D Gritzalis - Computers & Security, 2013 - Elsevier
Smartphone users increasingly download and install third-party applications from official
application repositories. Attackers may use this centralized application delivery architecture …

Addroid: Privilege separation for applications and advertisers in android

P Pearce, AP Felt, G Nunez, D Wagner - … of the 7th ACM Symposium on …, 2012 - dl.acm.org
Advertising is a critical part of the Android ecosystem---many applications use one or more
advertising services as a source of revenue. To use these services, developers must bundle …

An analysis of the privacy and security risks of android vpn permission-enabled apps

M Ikram, N Vallina-Rodriguez, S Seneviratne… - Proceedings of the …, 2016 - dl.acm.org
Millions of users worldwide resort to mobile VPN clients to either circumvent censorship or to
access geo-blocked content, and more generally for privacy and security purposes. In …

An empirical study of usages, updates and risks of third-party libraries in java projects

Y Wang, B Chen, K Huang, B Shi, C Xu… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
Third-party libraries play a key role in software development as they can relieve developers
of the heavy burden of re-implementing common functionalities. However, third-party …

[PDF][PDF] Detecting passive content leaks and pollution in android applications

YZX Jiang, Z Xuxian - Proceedings of the 20th Network and Distributed …, 2013 - yajin.org
In this paper, we systematically study two vulnerabilities and their presence in existing
Android applications (or “apps”). These two vulnerabilities are rooted in an unprotected …

[PDF][PDF] Investigating user privacy in android ad libraries

R Stevens, C Gibler, J Crussell, J Erickson… - Workshop on Mobile …, 2012 - cs.ucdavis.edu
Recent years have witnessed incredible growth in the popularity and prevalence of smart
phones. A flourishing mobile application market has evolved to provide users with additional …

Oauth demystified for mobile application developers

EY Chen, Y Pei, S Chen, Y Tian, R Kotcher… - Proceedings of the 2014 …, 2014 - dl.acm.org
OAuth has become a highly influential protocol due to its swift and wide adoption in the
industry. The initial objective of the protocol was specific: it serves the authorization needs …