Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

Yes, machine learning can be more secure! a case study on android malware detection

A Demontis, M Melis, B Biggio… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
To cope with the increasing variability and sophistication of modern attacks, machine
learning has been widely adopted as a statistically-sound tool for malware detection …

Recon: Revealing and controlling pii leaks in mobile network traffic

J Ren, A Rao, M Lindorfer, A Legout… - Proceedings of the 14th …, 2016 - dl.acm.org
It is well known that apps running on mobile devices extensively track and leak users'
personally identifiable information (PII); however, these users have little visibility into PII …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

[PDF][PDF] Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.

A Continella, Y Fratantonio, M Lindorfer, A Puccetti… - NDSS, 2017 - publik.tuwien.ac.at
Mobile apps are notorious for collecting a wealth of private information from users. Despite
significant effort from the research community in developing privacy leak detection tools …

Software and cyber security-a survey

刘剑, 苏璞睿, 杨珉, 和亮, 张源, 朱雪阳, 林惠民 - Journal of Software, 2017 - jos.org.cn
互联网已经渗入人类社会的各个方面, 极大地推动了社会进步. 与此同时, 各种形式的网络犯罪,
网络窃密等问题频繁发生, 给社会和国家安全带来了极大的危害. 网络安全已经成为公众和政府 …

PROUD-MAL: static analysis-based progressive framework for deep unsupervised malware classification of windows portable executable

SKJ Rizvi, W Aslam, M Shahzad, S Saleem… - Complex & Intelligent …, 2022 - Springer
Enterprises are striving to remain protected against malware-based cyber-attacks on their
infrastructure, facilities, networks and systems. Static analysis is an effective approach to …

HamDroid: permission-based harmful android anti-malware detection using neural networks

S Seraj, S Khodambashi, M Pavlidis… - Neural Computing and …, 2022 - Springer
Android platforms are a popular target for attackers, while many users around the world are
victims of Android malwares threatening their private information. Numerous Android anti …

Enhancing the description-to-behavior fidelity in android apps with privacy policy

L Yu, X Luo, C Qian, S Wang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Since more than 96 percent of mobile malware targets the Android platform, various
techniques based on static code analysis or dynamic behavior analysis have been …

Sherlock vs moriarty: A smartphone dataset for cybersecurity research

Y Mirsky, A Shabtai, L Rokach, B Shapira… - Proceedings of the 2016 …, 2016 - dl.acm.org
In this paper we describe and share with the research community, a significant smartphone
dataset obtained from an ongoing long-term data collection experiment. The dataset …