Research on third-party libraries in android apps: A taxonomy and systematic literature review

X Zhan, T Liu, L Fan, L Li, S Chen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Third-party libraries (TPLs) have been widely used in mobile apps, which play an essential
part in the entire Android ecosystem. However, TPL is a double-edged sword. On the one …

Mobile app privacy in software engineering research: A systematic mapping study

F Ebrahimi, M Tushev, A Mahmoud - Information and Software Technology, 2021 - Elsevier
Context: Mobile applications (apps) have become deeply personal, constantly demanding
access to privacy-sensitive information in exchange for more personalized user …

Can we trust the privacy policies of android apps?

L Yu, X Luo, X Liu, T Zhang - 2016 46th Annual IEEE/IFIP …, 2016 - ieeexplore.ieee.org
Recent years have witnessed the sharp increase of malicious apps that steal users' personal
information. To address users' concerns about privacy risks, more and more apps are …

Enhancing the description-to-behavior fidelity in android apps with privacy policy

L Yu, X Luo, C Qian, S Wang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Since more than 96 percent of mobile malware targets the Android platform, various
techniques based on static code analysis or dynamic behavior analysis have been …

An Android application risk evaluation framework based on minimum permission set identification

J Xiao, S Chen, Q He, Z Feng, X Xue - Journal of Systems and Software, 2020 - Elsevier
Android utilizes a security mechanism that requires apps to request permission for
accessing sensitive user data, eg, contacts and SMSs, or certain system features, eg …

NDroid: Toward tracking information flows across multiple Android contexts

L Xue, C Qian, H Zhou, X Luo, Y Zhou… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
For performance and compatibility reasons, developers tend to use native code in their
applications (or simply apps). This makes a bidirectional data flow through multiple contexts …

Detecting behavior anomalies in graphical user interfaces

V Avdiienko, K Kuznetsov… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
When interacting with user interfaces, do users always get what they expect? For each user
interface element in thousands of Android apps, we extracted the Android APIs they invoke …

Security-oriented view of app behaviour using textual descriptions and user-granted permission requests

O Olukoya, L Mackenzie, I Omoronyia - Computers & Security, 2020 - Elsevier
One of the major Android security mechanisms for enforcing restrictions on the core facilities
of a device that an app can access is permission control. However, there is an enormous …

Smartpi: Understanding permission implications of android apps from user reviews

R Wang, Z Wang, B Tang, L Zhao… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the unprecedented convenience brought by Apps on mobile devices, we are facing
severe security attacks and privacy leakage caused by them since they may stealthily …

Automated permission model generation for securing SDN control-plane

H Kang, V Yegneswaran, S Ghosh… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
An important consideration in software-defined networks (SDNs), is that one SDN
application, through a bug or API misuse, can break an entire SDN. While previous works …