Intelligent analysis of android application privacy policy and permission consistency

T Tu, H Zhang, B Gong, D Du, Q Wen - Artificial Intelligence Review, 2024 - Springer
With the continuous development of mobile devices, mobile applications bring a lot of
convenience to people's lives. The abuse of mobile device permissions is prone to the risk of …

Extensible and scalable architecture for hybrid analysis

M Miltenberger, S Arzt - Proceedings of the 12th ACM SIGPLAN …, 2023 - dl.acm.org
The prevalence of Android apps and their widespread use in daily life has made them a
prime subject of study in program analysis. Apps for e-mail, navigation, mobile banking …

Essential or Excessive? MINDAEXT: Measuring Data Minimization Practices among Browser Extensions

Y Ling, Y Hao, Y Wang, K Wang, G Bai… - … on Software Analysis …, 2024 - ieeexplore.ieee.org
Since browser extensions are prevailingly executed in the background to enable extra
functionalities and enhance the user experience for web browsers, the potential over …

[PDF][PDF] RPCDroid: Runtime Identification of Permission Usage Contexts in Android Applications.

M Guerra, R Milanese, R Oliveto, F Fasano - ICISSP, 2023 - scitepress.org
Over the years, there has been an explosion in the app market offering users a wide range
of functionalities especially since modern devices are equipped with many hardware …

Context Correlation for Automated Dynamic Android App Analysis to Improve Impact Rating of Privacy and Security Flaws

K Heid, J Heider - International Conference on Risks and Security of …, 2022 - Springer
Privacy and security flaws in apps are commonly detected by static and dynamic analysis
approaches. However, the realistic impact rating for detected flaws is often limited. Static …

Fraunhofer SIT, Rheinstr. 75, 64295 Darmstadt, Germany {kris. heid, jens. heider}@ sit. fraunhofer. de

K Heid - Risks and Security of Internet and Systems: 17th …, 2023 - books.google.com
Privacy and security flaws in apps are commonly detected by static and dynamic analysis
approaches. However, the realistic impact rating for detected flaws is often limited. Static …