A survey of app store analysis for software engineering

W Martin, F Sarro, Y Jia, Y Zhang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
App Store Analysis studies information about applications obtained from app stores. App
stores provide a wealth of information derived from users that would not exist had the …

Toward engineering a secure android ecosystem: A survey of existing techniques

M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng… - ACM Computing …, 2016 - dl.acm.org
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …

Droiddetector: android malware characterization and detection using deep learning

Z Yuan, Y Lu, Y Xue - Tsinghua Science and Technology, 2016 - ieeexplore.ieee.org
Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android
has been the most popular mobile operating system since 2012. However, owing to the …

Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence

X Liao, K Yuan, XF Wang, Z Li, L Xing… - Proceedings of the 2016 …, 2016 - dl.acm.org
To adapt to the rapidly evolving landscape of cyber threats, security professionals are
actively exchanging Indicators of Compromise (IOC)(eg, malware signatures, botnet IPs) …

{SmartAuth}:{User-Centered} authorization for the internet of things

Y Tian, N Zhang, YH Lin, XF Wang, B Ur… - 26th USENIX Security …, 2017 - usenix.org
Internet of Things (IoT) platforms often require users to grant permissions to third-party apps,
such as the ability to control a lock. Unfortunately, because few users act based upon, or …

Mining apps for abnormal usage of sensitive data

V Avdiienko, K Kuznetsov, A Gorla… - 2015 IEEE/ACM 37th …, 2015 - ieeexplore.ieee.org
What is it that makes an app malicious? One important factor is that malicious apps treat
sensitive data differently from benign apps. To capture such differences, we mined 2,866 …

Ttpdrill: Automatic and accurate extraction of threat actions from unstructured text of cti sources

G Husari, E Al-Shaer, M Ahmed, B Chu… - Proceedings of the 33rd …, 2017 - dl.acm.org
With the rapid growth of the cyber attacks, sharing of cyber threat intelligence (CTI) becomes
essential to identify and respond to cyber attack in timely and cost-effective manner …

Extractor: Extracting attack behavior from threat reports

K Satvat, R Gjomemo… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
The knowledge on attacks contained in Cyber Threat Intelligence (CTI) reports is very
important to effectively identify and quickly respond to cyber threats. However, this …

Towards the detection of inconsistencies in public security vulnerability reports

Y Dong, W Guo, Y Chen, X Xing, Y Zhang… - 28th USENIX security …, 2019 - usenix.org
Public vulnerability databases such as Common Vulnerabilities and Exposures (CVE) and
National Vulnerability Database (NVD) have achieved a great success in promoting …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …