Android source code vulnerability detection: a systematic literature review

J Senanayake, H Kalutarage, MO Al-Kadri… - ACM Computing …, 2023 - dl.acm.org
The use of mobile devices is rising daily in this technological era. A continuous and
increasing number of mobile applications are constantly offered on mobile marketplaces to …

Linking sensitive data

P Christen, T Ranbaduge, R Schnell - Methods and techniques for …, 2020 - Springer
Sensitive personal data are created in many application domains, and there is now an
increasing demand to share, integrate, and link such data within and across organisations in …

Android inter-app communication threats and detection techniques

S Bhandari, WB Jaballah, V Jain, V Laxmi… - Computers & …, 2017 - Elsevier
With the digital breakthrough, smart phones have become very essential component for
many routine tasks like shopping, paying bills, transferring money, instant messaging …

Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects

S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian… - Proceedings of the …, 2019 - dl.acm.org
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and
vulnerable certificate verification, seriously threaten software security. The vision of …

Cross-app interference threats in smart homes: Categorization, detection and handling

H Chi, Q Zeng, X Du, J Yu - 2020 50th Annual IEEE/IFIP …, 2020 - ieeexplore.ieee.org
Internet of Thing platforms prosper home automation applications (apps). Prior research
concerns intra-app security. Our work reveals that automation apps, even secured …

Do android taint analysis tools keep their promises?

F Pauck, E Bodden, H Wehrheim - Proceedings of the 2018 26th ACM …, 2018 - dl.acm.org
In recent years, researchers have developed a number of tools to conduct taint analysis of
Android applications. While all the respective papers aim at providing a thorough empirical …

Evaluation of static vulnerability detection tools with Java cryptographic API benchmarks

S Afrose, Y Xiao, S Rahaman… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Several studies showed that misuses of cryptographic APIs are common in real-world code
(eg, Apache projects and Android apps). There exist several open-sourced and commercial …

Detection of repackaged android malware with code-heterogeneity features

K Tian, D Yao, BG Ryder, G Tan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
During repackaging, malware writers statically inject malcode and modify the control flow to
ensure its execution. Repackaged malware is difficult to detect by existing classification …

Understanding and automatically detecting conflicting interactions between smart home IoT applications

R Trimananda, SAH Aqajari, J Chuang… - Proceedings of the 28th …, 2020 - dl.acm.org
Smart home devices provide the convenience of remotely control-ling and automating home
appliances. The most advanced smart home environments allow developers to write apps to …

Security analysis of permission re-delegation vulnerabilities in Android apps

BF Demissie, M Ceccato, LK Shar - Empirical Software Engineering, 2020 - Springer
The Android platform facilitates reuse of app functionalities by allowing an app to request an
action from another app through inter-process communication mechanism. This feature is …