3 Hits in 1.3 sec


Xin Chen, Sencun Zhu
2015 Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks - WiSec '15  
However, Android applications also send out users' sensitive information for legitimate functions.  ...  Android applications (apps for short) can send out users' sensitive information against users' intention.  ...  AndroidLeaks [12] is another static analysis tool to detect potential privacy leakage in Android applications by leveraging the WALA [4] framework. Mann et al.  ... 
doi:10.1145/2766498.2766507 dblp:conf/wisec/ChenZ15 fatcat:322cmvgs4jaqxhe4po6e43fdj4


Saeed Ibrahim Alqahtani, Shujun Li
2017 Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17  
not aware of any automated system that can benchmark performance of privacy protection systems on Android devices.  ...  leakage and prevent such detected leakage on mobile devices. is is a to do note at margin While it is obviously essential to evaluate the accuracy and e ectiveness of privacy protection systems, we are  ...  ACKNOWLEDGMENTS We would like to thank authors of [22] and [17] for providing more information about their work. anks also go to Haiyue Yuan of the University of Surrey, for his ideas and help in testing  ... 
doi:10.1145/3098954.3098984 dblp:conf/IEEEares/AlqahtaniL17 fatcat:boz5slvaizdxbi3obsprasourq

Static analysis of android apps: A systematic literature review

Li Li, Tegawendé F. Bissyandé, Mike Papadakis, Siegfried Rasthofer, Alexandre Bartel, Damien Octeau, Jacques Klein, Le Traon
2017 Information and Software Technology  
Static analysis approaches have been proposed for different tasks, including for assessing the security of Android apps, detecting app clones, automating test cases generation, or for uncovering non-functional  ...  Conclusion: The research community is still facing a number of challenges for building approaches that are aware altogether of implicit-Flows, dynamic code loading features, reflective calls, native code  ...  The authors would like to thank the anonymous reviewers for their helpful comments and suggestions, as well as all the authors of static Android analysis who have provided useful feedback to the initial  ... 
doi:10.1016/j.infsof.2017.04.001 fatcat:h2hsjhfr6zfsrghj5yac3cnwte