Research on third-party libraries in android apps: A taxonomy and systematic literature review

X Zhan, T Liu, L Fan, L Li, S Chen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Third-party libraries (TPLs) have been widely used in mobile apps, which play an essential
part in the entire Android ecosystem. However, TPL is a double-edged sword. On the one …

Toward engineering a secure android ecosystem: A survey of existing techniques

M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng… - ACM Computing …, 2016 - dl.acm.org
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …

Reliable third-party library detection in android and its security applications

M Backes, S Bugiel, E Derr - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Third-party libraries on Android have been shown to be security and privacy hazards by
adding security vulnerabilities to their host apps or by misusing inherited access rights …

libmpk: Software abstraction for intel memory protection keys (intel {MPK})

S Park, S Lee, W Xu, H Moon, T Kim - 2019 USENIX Annual Technical …, 2019 - usenix.org
Intel Memory Protection Keys (MPK) is a new hardware primitive to support thread-local
permission control on groups of pages without requiring modification of page tables …

An empirical study of usages, updates and risks of third-party libraries in java projects

Y Wang, B Chen, K Huang, B Shi, C Xu… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
Third-party libraries play a key role in software development as they can relieve developers
of the heavy burden of re-implementing common functionalities. However, third-party …

Dynpta: Combining static and dynamic analysis for practical selective data protection

T Palit, JF Moon, F Monrose… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
As control flow hijacking attacks become more challenging due to the deployment of various
exploit mitigation technologies, the leakage of sensitive process data through the …

Detecting third-party libraries in android applications with high precision and recall

Y Zhang, J Dai, X Zhang, S Huang… - 2018 IEEE 25th …, 2018 - ieeexplore.ieee.org
Third-party libraries are widely used in Android applications to ease development and
enhance functionalities. However, the incorporated libraries also bring new security & …

Android malware detection using complex-flows

F Shen, J Del Vecchio, A Mohaisen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper proposes a new technique to detect mobile malware based on information flow
analysis. Our approach examines the structure of information flows to identify patterns of …

Nested enclave: Supporting fine-grained hierarchical isolation with sgx

J Park, N Kang, T Kim, Y Kwon… - 2020 ACM/IEEE 47th …, 2020 - ieeexplore.ieee.org
Although hardware-based trusted execution environments (TEEs) have evolved to provide
strong isolation with efficient hardware supports, their current monolithic model poses …

To update or not to update: Insights from a two-year study of android app evolution

VF Taylor, I Martinovic - Proceedings of the 2017 ACM on Asia …, 2017 - dl.acm.org
Although there are over 1,900,000 third-party Android apps in the Google Play Store, little is
understood about how their security and privacy characteristics, such as dangerous …