A survey of android application and malware hardening

V Sihag, M Vardhan, P Singh - Computer Science Review, 2021 - Elsevier
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …

Securing android: a survey, taxonomy, and challenges

Sufatrio, DJJ Tan, TW Chua, VLL Thing - ACM Computing Surveys …, 2015 - dl.acm.org
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …

Conceptual framework for the security of mobile health applications on android platform

M Hussain, AA Zaidan, BB Zidan, S Iqbal… - Telematics and …, 2018 - Elsevier
Mobile Health (mHealth) applications are readily accessible to the average user of mobile
devices, and despite the potential of mHealth applications to improve the availability …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Research on third-party libraries in android apps: A taxonomy and systematic literature review

X Zhan, T Liu, L Fan, L Li, S Chen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Third-party libraries (TPLs) have been widely used in mobile apps, which play an essential
part in the entire Android ecosystem. However, TPL is a double-edged sword. On the one …

Identifying open-source license violation and 1-day security risk at large scale

R Duan, A Bijlani, M Xu, T Kim, W Lee - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
With millions of apps available to users, the mobile app market is rapidly becoming very
crowded. Given the intense competition, the time to market is a critical factor for the success …

Jucify: A step towards android code unification for enhanced static analysis

J Samhi, J Gao, N Daoudi, P Graux, H Hoyez… - Proceedings of the 44th …, 2022 - dl.acm.org
Native code is now commonplace within Android app packages where it co-exists and
interacts with Dex bytecode through the Java Native Interface to deliver rich app …

[PDF][PDF] Going native: Using a large-scale analysis of android apps to create a practical native-code sandboxing policy

V Afonso, A Bianchi, Y Fratantonio… - The Network and …, 2016 - re.public.polimi.it
Current static analysis techniques for Android applications operate at the Java level—that is,
they analyze either the Java source code or the Dalvik bytecode. However, Android allows …

[PDF][PDF] FLEXDROID: Enforcing In-App Privilege Separation in Android.

J Seo, D Kim, D Cho, I Shin, T Kim - NDSS, 2016 - gts3.org
Mobile applications are increasingly integrating third-party libraries to provide various
features, such as advertising, analytics, social networking, and more. Unfortunately, such …

DroidNative: Automating and optimizing detection of Android native code malware variants

S Alam, Z Qu, R Riley, Y Chen, V Rastogi - computers & security, 2017 - Elsevier
According to the Symantec and F-Secure threat reports, mobile malware development in
2013 and 2014 has continued to focus almost exclusively (~ 99%) on the Android platform …