The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

[PDF][PDF] Drebin: Effective and explainable detection of android malware in your pocket.

D Arp, M Spreitzenbarth, M Hubner, H Gascon… - Ndss, 2014 - media.telefonicatech.com
Malicious applications pose a threat to the security of the Android platform. The growing
amount and diversity of these applications render conventional defenses largely ineffective …

Iccta: Detecting inter-component privacy leaks in android apps

L Li, A Bartel, TF Bissyandé, J Klein… - 2015 IEEE/ACM 37th …, 2015 - ieeexplore.ieee.org
Shake Them All is a popular" Wallpaper" application exceeding millions of downloads on
Google Play. At installation, this application is given permission to (1) access the Internet (for …

Stack overflow considered harmful? the impact of copy&paste on android application security

F Fischer, K Böttinger, H Xiao… - … IEEE symposium on …, 2017 - ieeexplore.ieee.org
Online programming discussion platforms such as Stack Overflow serve as a rich source of
information for software developers. Available information include vibrant discussions and …

Reliable third-party library detection in android and its security applications

M Backes, S Bugiel, E Derr - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Third-party libraries on Android have been shown to be security and privacy hazards by
adding security vulnerabilities to their host apps or by misusing inherited access rights …

Dissecting android malware: Characterization and evolution

Y Zhou, X Jiang - 2012 IEEE symposium on security and …, 2012 - ieeexplore.ieee.org
The popularity and adoption of smart phones has greatly stimulated the spread of mobile
malware, especially on the popular platforms such as Android. In light of their rapid growth …

Semantics-aware android malware classification using weighted contextual api dependency graphs

M Zhang, Y Duan, H Yin, Z Zhao - … of the 2014 ACM SIGSAC conference …, 2014 - dl.acm.org
The drastic increase of Android malware has led to a strong interest in developing methods
to automate the malware analysis process. Existing automated Android malware detection …

You get where you're looking for: The impact of information sources on code security

Y Acar, M Backes, S Fahl, D Kim… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Vulnerabilities in Android code--including but not limited to insecure data storage,
unprotected inter-component communication, broken TLS implementations, and violations of …

[PDF][PDF] Copperdroid: Automatic reconstruction of android malware behaviors.

K Tam, SJ Khan, A Fattori, L Cavallaro - Ndss, 2015 - core.ac.uk
Mobile devices and their application marketplaces drive the entire economy of the today's
mobile landscape. Android platforms alone have produced staggering revenues, exceeding …