A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
DroidJust
2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks - WiSec '15
However, Android applications also send out users' sensitive information for legitimate functions. ...
Android applications (apps for short) can send out users' sensitive information against users' intention. ...
AndroidLeaks [12] is another static analysis tool to detect potential privacy leakage in Android applications by leveraging the WALA [4] framework. Mann et al. ...
doi:10.1145/2766498.2766507
dblp:conf/wisec/ChenZ15
fatcat:322cmvgs4jaqxhe4po6e43fdj4
PPAndroid-Benchmarker
2017
Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17
not aware of any automated system that can benchmark performance of privacy protection systems on Android devices. ...
leakage and prevent such detected leakage on mobile devices. is is a to do note at margin While it is obviously essential to evaluate the accuracy and e ectiveness of privacy protection systems, we are ...
ACKNOWLEDGMENTS We would like to thank authors of [22] and [17] for providing more information about their work. anks also go to Haiyue Yuan of the University of Surrey, for his ideas and help in testing ...
doi:10.1145/3098954.3098984
dblp:conf/IEEEares/AlqahtaniL17
fatcat:boz5slvaizdxbi3obsprasourq
Static analysis of android apps: A systematic literature review
2017
Information and Software Technology
Static analysis approaches have been proposed for different tasks, including for assessing the security of Android apps, detecting app clones, automating test cases generation, or for uncovering non-functional ...
Conclusion: The research community is still facing a number of challenges for building approaches that are aware altogether of implicit-Flows, dynamic code loading features, reflective calls, native code ...
The authors would like to thank the anonymous reviewers for their helpful comments and suggestions, as well as all the authors of static Android analysis who have provided useful feedback to the initial ...
doi:10.1016/j.infsof.2017.04.001
fatcat:h2hsjhfr6zfsrghj5yac3cnwte