ID | Title | Authors | Year |
---|---|---|---|
P1 | NeSeDroid–Android Malware Detection Based on Network Traffic and Sensitive Resource Accessing [45] | N.T. Cam, N.C.H. Phuoc | 2017 |
P2 | Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps [68] | M. Eskandari, B. Kessler, M. Ahmad, A. Santana de Oliveira, B. Crispo | 2017 |
P3 | MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models [178] | E. Mariconti, L. Onwuzurike, P. Andriotis, E. De Cristofaro, G. Ross, G. Stringhini | 2017 |
P4 | Ripple: Reflection Analysis for Android Apps in Incomplete Information Environments [300] | Y Zhang, T Tan, Y Li, J Xue | 2017 |
P5 | AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection [75] | A. Feizollah, N. B. Anuar, R. Salleh, G. Suarez, S. Furnell | 2017 |
P6 | Profiling the responsiveness of Android applications via automated resource amplification [246] | Y. Wang, A. Rountev | 2016 |
P7 | Detecting Invalid Layer Combinations Using Control-Flow Analysis for Android [232] | N. Suzuki, T. Kamina, K. Maruyama | 2016 |
P8 | Graph-aided directed testing of Android applications for checking runtime privacy behaviours [127] | J.C.J. Keng, L. Jiang, T.K. Wee, R.K. Balan | 2016 |
P9 | Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models [124] | M. Junaid, D. Liu, D. Kung | 2016 |
P10 | IacDroid: Preventing Inter-App Communication capability leaks in Android [289] | D. Zhang, R. Wang, Z. Lin, D. Guo, X. Cao | 2016 |
P11 | Practical, formal synthesis and automatic enforcement of security policies for android [21] | H. Bagheri, A. Sadeghi, R. Jabbarvand, S. Malek | 2016 |
P12 | CapaDroid: Detecting Capability Leak for Android Applications [265] | T. Wu, Y. Yang | 2016 |
P13 | Asynchrony-aware static analysis of Android applications [183] | A. Mishra, A. Kanade, Y.N. Srikant | 2016 |
P14 | Identifying Android inter app communication vulnerabilities using static and dynamic analysis [61] | B.F. Demissie, D. Ghio, M. Ceccato, A. Avancini | 2016 |
P15 | Towards Automatically Generating Privacy Policy for Android Apps [287] | L. Yu, T. Zhang, X. Luo, L. Xue, H. Chang | 2016 |
P16 | Revisiting the Description-to-Behavior Fidelity in Android Applications [285] | L. Yu, X. Luo, C. Qian, S. Wang | 2016 |
P17 | Triggerscope: Towards detecting logic bombs in android applications [82] | Y. Fratantonio, A. Bianchi, W. Robertson, E. Kirda, C. Kruegel, G. Vigna | 2016 |
P18 | Automated test generation for detection of leaks in Android applications [292] | H. Zhang, H. Wu, A. Rountev | 2016 |
P19 | Automatic Construction of Callback Model for Android Application [99] | C. Guo, Q. Ye, N. Dong, G. Bai, J.S. Dong, J. Xu | 2016 |
P20 | Automated energy optimization of HTTP requests for mobile applications [143] | D. Li, Y. Lyu, J. Gui, W.G.J. Halfond | 2016 |
P21 | Understanding and detecting wake lock misuses for Android applications [168] | Y. Liu, C. Xu, S.C. Cheung, V. Terragni | 2016 |
P22 | Taming Android fragmentation: characterizing and detecting compatibility issues for Android apps [252] | L. Wei, Y. Liu, S.C. Cheung | 2016 |
P23 | Reflection-aware static analysis of Android apps [149] | L. Li, T.F. Bissyandé, D. Octeau, J. Klein | 2016 |
P24 | Automated testing and notification of mobile app privacy leak-cause behaviours [126] | J.C.J. Keng | 2016 |
P25 | Finding resume and restart errors in Android applications [220] | Z. Shan, T. Azim, I. Neamtiu | 2016 |
P26 | DroidRA: Taming Reflection to Support Whole-ProgramAnalysis of Android Apps [148] | L. Li, T.F. Bissyandé, D. Octeau, J. Klein | 2016 |
P27 | Empirical assessment of machine learning-based malware detectors for Android [8] | K. Allix, T.F. Bissyandé, Q. Jérome, J. Klein, Y. Le Traon | 2016 |
P28 | Effective detection of android malware based on the usage of data flow APIs and machine learning [264] | S. Wu, P. Wang, X. Li, Y. Zhang | 2016 |
P29 | On the Static Analysis of Hybrid Mobile Apps [38] | A.D. Brucker, M. Herzberg | 2016 |
P30 | Towards a Generic Framework for Automating Extensive Analysis of Android Applications [150] | L. Li, D. Li, A. Bartel, T.F. Bissyandé, J. Klein, Y. Le Traon | 2016 |
P31 | Static Program Analysis for Identifying Energy Bugs in Graphics-Intensive Mobile Apps [129] | C.H.P. Kim, D. Kroening, M. Kwiatkowska | 2016 |
P32 | Combining static analysis with probabilistic models to enable market-scale android inter-component analysis [194] | D. Octeau, S. Jha, M. Dering, P. McDaniel, A. Bartel, L. Li, Y. Le Traon | 2016 |
P33 | DroidNative: automating and optimizing detection of android native code malware variants [6] | S. Alam, Z. Qu, R. Riley, Y. Chen, V. Rastogi | 2016 |
P34 | Enabling Automatic Protocol Behavior Analysis for Android Applications [131] | J. Kim, H. Choi, H. Namkung, W. Choi, B. Choi, H. Hong, D. Han | 2016 |
P35 | PERUIM: Understanding Mobile Application Privacy with permission-UI Mapping [156] | Y. Li, Y. Guo, X. Chen | 2016 |
P36 | HybriDroid: Static analysis framework for Android hybrid applications [138] | S. Lee, J. Dolby, S. Ryu | 2016 |
P37 | StubDroid: automatic inference of precise data-flow summaries for the android framework [11] | S. Arzt, E. Bodden | 2016 |
P38 | FlowMine: Android app analysis via data flow [225] | L. Sinha, S. Bhandari, P. Faruki, M.S. Gaur, V. Laxmi, M. Conti | 2016 |
P39 | Debugging energy-efficiency related field failures in mobile apps [25] | A. Banerjee, H.F. Guo, A. Roychoudhury | 2016 |
P40 | State-Taint Analysis for Detecting Resource Bugs [272] | Z. Xu, D. Fan, S. Qin | 2016 |
P41 | Fixing Resource Leaks in Android Apps with Light-Weight Static Analysis and Low-Overhead Instrumentation [164] | J. Liu, T. Wu, J. Yan, J. Zhang | 2016 |
P42 | Relda2: an effective static analysis tool for resource leak detection in Android apps[266] | T. Wu, J. Liu, X. Deng, J. Yan, J. Zhang | 2016 |
P43 | Detecting energy leaks in android app with poem [79] | A. Ferrari, D. Gallucci, D. Puccinelli, S. Giordano | 2016 |
P44 | Lightweight measurement and estimation of mobile ad energy consumption [97] | J. Gui, D. Li, M. Wan, W.G.J. Halfond | 2016 |
P45 | AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context [278] | W. Yang, X. Xiao, B. Andow, S. Li, T. Xie, W. Enck | 2015 |
P46 | Mining Apps for Abnormal Usage of Sensitive Data [15] | V. Avdiienko, K. Kuznetsov, A. Gorla, A. Zeller, S. Arzt, S. Rasthofer, E. Bodden | 2015 |
P47 | CLAPP: characterizing loops in Android applications [81] | Y. Fratantonio, A. Machiry, A. Bianchi, C. Kruegel, G. Vigna | 2015 |
P48 | Study and Refactoring of Android Asynchronous Programming [161] | Y. Lin, S. Okur, D. Dig | 2015 |
P49 | Tracking the Software Quality of Android Applications Along Their Evolution [108] | G. Hecht, O. Benomar, R. Rouvoy, N. Moha, L. Duchien | 2015 |
P50 | Covert Communication in Mobile Applications [211] | J. Rubin, M.I. Gordon, N. Nguyen, M.C. Rinard | 2015 |
P51 | Static Window Transition Graphs for Android [276] | S. Yang, H. Zhang, H. Wu, Y. Wang, A. Rountev | 2015 |
P52 | Static Analysis of Implicit Control Flow: Resolving Java Reflection and Android Intents [27] | P. Barros, R. Just, S. Millstein, P. Vines, W. Dietl, M. D’Amorim, M.D. Ernst | 2015 |
P53 | String Analysis of Android Applications [60] | J. Del Vecchio, F. Shen, K.M. Yee, B. Wang, S.Y. Ko, L. Ziarek | 2015 |
P54 | Interactively verifying absence of explicit information flows in Android apps [31] | O. Bastani, S. Anand, A. Aiken | 2015 |
P55 | ShamDroid: gracefully degrading functionality in the presence of limited resource access [40] | L. Brutschy, P. Ferrara, O. Tripp, M. Pistoia | 2015 |
P56 | WuKong: a scalable and accurate two-phase approach to Android app clone detection [241] | H. Wang, Y. Guo, Z. Ma, X. Chen | 2015 |
P57 | Reevaluating Android Permission Gaps with Static and Dynamic Analysis [242] | H. Wang, Y. Guo, Z. Tang, G. Bai, X. Chen | 2015 |
P58 | Andro-autopsy: Anti-malware system based on similarity matching of malware and malware creator-centric information [117] | J. Jang, H. Kang, J. Woo, A. Mohaisen, H.K. Kim | 2015 |
P59 | EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework [47] | Y. Cao, Y. Fratantonio, A. Bianchi, M. Egele, C. Kruegel, G. Vigna, Y. Chen | 2015 |
P60 | What the app is that? deception and countermeasures in the android user interface [36] | A. Bianchi, J. Corbetta, L. Invernizzi, Y. Fratantonio, C. Kruegel, G. Vigna | 2015 |
P61 | Scalable and Precise Taint Analysis for Android [113] | W. Huang, Y. Dong, A. Milanova, J. Dolby | 2015 |
P62 | AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications [284] | L. Yu, T. Zhang, X. Luo, L. Xue | 2015 |
P63 | Information-Flow Analysis of Android Applications in DroidSafe [92] | M.I. Gordon, D.Kim, J.H. Perkins, L.Gilham, N.Nguyen, M.C. Rinard | 2015 |
P64 | StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications [305] | Y. Zhauniarovich, M. Ahmad, O. Gadyatskaya, B. Crispo, F. Massacci | 2015 |
P65 | Potential Component Leaks in Android Apps: An Investigation into a New Feature Set for Malware Detection [145] | L. Li, K. Allix, D. Li, A. Bartel, T.F. Bissyandé, J. Klein | 2015 |
P66 | Static Control-Flow Analysis of User-Driven Callbacks in Android Applications [275] | S.Yang, D.Yan, H.Wu, Y.Wang, A.Rountev | 2015 |
P67 | Composite Constant Propagation: Application to Android Inter-Component Communication Analysis [193] | D. Octeau, D. Luchaup, M. Dering, S. Jha, P.D. McDaniel | 2015 |
P68 | IccTA: Detecting Inter-Component Privacy Leaks in Android Apps [147] | L. Li, A. Bartel, T.F. Bissyandé, J.Klein, Y. Le Traon, S. Arzt, S. Rasthofer, E. Bodden, D. Octeau, P.D. McDaniel | 2015 |
P69 | EcoDroid: An Approach for Energy-based Ranking of Android Apps [34] | R.J. Behrouz, A. Sadeghi, J. Garcia, S. Malek, P. Ammann | 2015 |
P70 | Supor: Precise and scalable sensitive user input detection for android apps [112] | J. Huang, Z. Li, X. Xiao, Z. Wu, K. Lu, X. Zhang, G. Jiang | 2015 |
P71 | Uipicker: User-input privacy identification in mobile applications [186] | Y. Nan, M. Yang, Z. Yang, S. Zhou, G. Gu, X. Wang | 2015 |
P72 | Andro Lyze: A Distributed Framework for Efficient Android App Analysis [33] | L. Baumgärtner, P. Graubner, N. Schmidt, B. Freisleben | 2015 |
P73 | Using text mining to infer the purpose of permission use in mobile apps [243] | H. Wang, J. Hong, Y. Guo | 2015 |
P74 | Static reference analysis for GUI objects in Android software [210] | A. Rountev, D. Yan | 2014 |
P75 | Static analysis for independent app developers [39] | L. Brutschy, P. Ferrara, P. Müller | 2014 |
P76 | Cochecker: Detecting capability and sensitive data leaks from component chains in android [57] | X. Cui, D. Yu, P.P.F. Chan, L.C.K. Hui, S.M. Yiu, S. Qing | 2014 |
P77 | Android Taint Flow Analysis for App Sets [135] | W. Klieber, L. Flynn, A. Bhosale, L. Jia, L. Bauer | 2014 |
P78 | Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps [251] | F. Wei, S. Roy, X. Ou, Robby | 2014 |
P79 | AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications [295] | M. Zhang, H. Yin | 2014 |
P80 | Semantics-aware android malware classification using weighted contextual api dependency graphs [297] | M. Zhang, Y. Duan, H. Yin, Z. Zhao | 2014 |
P81 | DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket [10] | D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, K. Rieck | 2014 |
P82 | Retrofitting concurrency for android applications through refactoring [160] | Y. Lin, C. Radoi, D. Dig | 2014 |
P83 | Checking app behavior against app descriptions [93] | A. Gorla, I. Tavecchia, F. Gross, A. Zeller | 2014 |
P84 | Information Flows As a Permission Mechanism [224] | F. Shen, N. Vishnubhotla, C. Todarka, M. Arora, B. Dhandapani, E.J. Lehner, S.Y. Ko, L. Ziarek | 2014 |
P85 | Greendroid: Automated diagnosis of energy inefficiency for smartphone applications [167] | Y. Liu, C. Xu, S.C. Cheung, J. Lu | 2014 |
P86 | FlowDroid: Precise context-,flow-,field-,object-sensitive and lifecycle-aware taint analysis for android apps [12] | S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, P.D. McDaniel | 2014 |
P87 | Cassandra: Towards a Certifying App Store for Android [169] | S. Lortz, H. Mantel, A. Starostin, T. Bähr, D. Schneider, A. Weber | 2014 |
P88 | Code Injection Attacks on HTML5-based Mobile Apps:Characterization, Detection and Mitigation [121] | X. Jin, X. Hu, K. Ying, W. Du, H. Yin, G. Nagesh Peri | 2014 |
P89 | Efficient, context-aware privacy leakage confinement for android applications without firmware modding [296] | M. Zhang, H. Yin | 2014 |
P90 | Collaborative Verification of Information Flow for a High-Assurance App Store [67] | M.D. Ernst, R. Just, S. Millstein, W. Dietl, S. Pernsteiner, F. Roesner, K. Koscher, P. Barros, R. Bhoraskar, S. Han, P. Vines, E.X. Wu | 2014 |
P91 | Multi-App Security Analysis with FUSE: Statically Detecting Android App Collusion [207] | T. Ravitch, E.R. Creswick, A. Tomb, A. Foltzer, T. Elliott, L. Casburn | 2014 |
P92 | Characterizing and detecting performance bugs for smartphone applications [166] | Y. Liu, C. Xu, S.C. Cheung | 2014 |
P93 | AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction [111] | J. Huang, X. Zhang, L. Tan, P. Wang, B. Liang | 2014 |
P94 | Apposcopy: semantics-based detection of Android malware through static analysis [78] | Y. Feng, S. Anand, I. Dillig, A. Aiken | 2014 |
P95 | Detecting energy bugs and hotspots in mobile apps [24] | A. Banerjee, L.K. Chong, S. Chattopadhyay, A. Roychoudhury | 2014 |
P96 | Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges and Solutions for Analyzing Android [29] | A. Bartel, J. Klein, M. Monperrus, Y. Le Traon | 2014 |
P97 | Responsiveness analysis tool for android application [195] | T. Ongkosit, S. Takada | 2014 |
P98 | Automatically exploiting potential component leaks in android applications [144] | L. Li, A. Bartel, J. Klein, Y. Le Traon | 2014 |
P99 | Effective inter-component communication mapping in android: An essential step towards holistic security analysis [192] | D. Octeau, P.D. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, Y. Le Traon | 2013 |
P100 | DroidAPIMiner: Mining API-level features for robust malware detection in android [1] | Y. Aafer, W. Du, H. Yin | 2013 |
P101 | An empirical study of cryptographic misuse in android applications [64] | M. Egele, D. Brumley, Y. Fratantonio, C. Kruegel | 2013 |
P102 | Targeted and depth-first exploration for systematic testing of android apps [16] | T. Azim, I. Neamtiu | 2013 |
P103 | Sound and precise malware analysis for android via pushdown reachability and entry-point saturation [159] | S. Liang, A.W. Keep, M. Might, S. Lyde, T. Gilray, Liang, S., Keep, A. W., Might, M., Lyde, S., Gilray, T., P. Aldous, D. Van Horn | 2013 |
P104 | AppIntent: analyzing sensitive data transmission in android for privacy leakage detection [282] | Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, X.S. Wang | 2013 |
P105 | AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users [209] | S. Rosen, Z. Qian, Z.M. Mao | 2013 |
P106 | Flow permissions for android [110] | S. Holavanalli, D. Manuel, V. Nanjundaswamy, B. Rosenberg, F. Shen, S.Y. Ko, L. Ziarek | 2013 |
P107 | Slicing Droids: Program Slicing for Smali Code [109] | J. Hoffmann, M. Ussath, T. Holz, M. Spreitzenbarth | 2013 |
P108 | A grey-box approach for automated GUI-model generation of mobile applications [277] | W. Yang, M.R. Prasad, T. Xie | 2013 |
P109 | Structural detection of android malware using embedded call graphs [88] | H. Gascon, F. Yamaguchi, D. Arp, K. Rieck | 2013 |
P110 | Estimating mobile application energy consumption using program analysis [104] | S. Hao, D. Li, W.G.J. Halfond, R. Govindan | 2013 |
P111 | Characterizing and detecting resource leaks in Android applications [98] | C. Guo, J. Zhang, J. Yan, Z. Zhang, Y. Zhang | 2013 |
P112 | Calculating source line level energy information for Android applications [142] | D. Li, S. Hao, W.G.J. Halfond, R. Govindan | 2013 |
P113 | Smartdroid: an automatic system for revealing ui-based trigger conditions in android applications [306] | C. Zheng, S. Zhu, S. Dai, G. Gu, X. Gong, X. Han, W. Zou | 2012 |
P114 | Why Eve and Mallory love Android: An analysis of Android SSL (in) security [69] | S. Fahl, M. Harbach, T. Muders, M. Smith, L. Baumgärtner, B. Freisleben | 2012 |
P115 | User-aware privacy control via extended static-information-flow analysis [269] | X. Xiao, N. Tillmann, M. Fähndrich, J. De Halleux, M. Moskal | 2012 |
P116 | Dr. Android and Mr. Hide: fine-grained permissions in android applications [118] | J. Jeon, K. K. Micinski, J. A. Vaughan, A. Fogel, N. Reddy, J. S. Foster, T. D. Millstein | 2012 |
P117 | LeakMiner: Detect Information Leakage on Android with Static Taint Analysis [281] | Z. Yang, M. Yang | 2012 |
P118 | SCANDAL: Static Analyzer for Detecting Privacy Leaks in Android Applications [130] | J. Kim, Y. Yoon, K. Yi, J. Shin, S. Center | 2012 |
P119 | A framework for static detection of privacy leaks in android applications [176] | C. Mann, A. Starostin | 2012 |
P120 | DroidChecker: analyzing android applications for capability leak [48] | P.P.F. Chan, L. C. K. Hui, S. M. Yiu | 2012 |
P121 | DroidMat: Android Malware Detection through Manifest and API Calls Tracing [260] | D.J. Wu, C.H. Mao, T.E. Wei, H.M. Lee, K.P. Wu | 2012 |
P122 | Static analysis of Android programs [200] | E. Payet, F. Spoto | 2012 |
P123 | Estimating Android applications’ CPU energy usage via bytecode profiling [103] | H. Hao, D. Li, W. G. J. Halfond, R. Govindan | 2012 |
P124 | What is keeping my phone awake?: characterizing and detecting no-sleep energy bugs in smartphone apps [198] | A. Pathak, A. Jindal, Y. Charlie Hu, S. P. Midkiff | 2012 |
P125 | User-centric dependence analysis for identifying malicious mobile apps [66] | K.O. Elish, D. Yao, B.G. Ryder | 2012 |
P126 | AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale [90] | C. Gibler, J. Crussell, J. Erickson, H. Chen | 2012 |
P127 | Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. [308] | Y. Zhou, Z. Wang, W. Zhou, X. Jiang | 2012 |
P128 | RiskRanker: Scalable and Accurate Zero-day Android Malware Detection [95] | M.C. Grace, Y.Zhou, Q. Zhang, S. Zou, X. Jiang | 2012 |
P129 | Chex: statically vetting android apps for component hijacking vulnerabilities [170] | L. Lu, Z. Li, Z. Wu, W. Lee, G. Jiang | 2012 |
P130 | Automatically securing permission-based software by reducing the attack surface: An application to android [28] | A. Bartel, J. Klein, Y. Le Traon, M. Monperrus | 2012 |
P131 | Android permissions demystified [76] | A. Porter Felt, E. Chin, S. Hanna, D. Song, D. A. Wagner: | 2011 |
P132 | Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications [32] | L. Batyuk, M. Herpich, S. A. Çamtepe, K. Raddatz, A. D. Schmidt, S. Albayrak | 2011 |
P133 | Analyzing Inter-application Communication in Android [53] | E. Chin, A. Porter Felt, K. Greenwood, D. A. Wagner | 2011 |
P134 | PiOS: Detecting Privacy Leaks in iOS Applications [63] | M. Egele, C. Kruegel, E. Kirda, G. Vigna | 2011 |
P135 | Energypatch: Repairing resource leaks to improve energy-efficiency of android apps [26] | A. Banerjee, L. K. Chong, C. Ballabriga, A. Roychoudhury | 2018 |
P136 | A multi-view context-aware approach to Android malware detection and malicious code localization [187] | A. Narayanan, M. Chandramohan, L. Chen, Y. Liu | 2018 |
P137 | AndroidOff:Offloading android application based on cost estimation [51] | X. Chen, J. Chen, B. Liu, Y. Ma, Y. Zhang, H. Zhong | 2019 |
P138 | A SEALANT for Inter-App Security Holes in Android [139] | Y.K. Lee, J.Y. Bang, G. Safi, A. Shahbazian, Y. Zhao, N. Medvidovic | 2017 |
P139 | LibD: Scalable and Precise Third-party Library Detection in Android Markets [154] | M. Li, W. Wang, P. Wang, S. Wang, D. Wu, J. Liu, R. Xue, W. Huo | 2017 |
P140 | Self-Hiding Behavior in Android Apps: Detection and Characterization [221] | Z. Shan, I.G. Neamtiu, S. Raina | 2018 |
P141 | Iconintent: automatic identification of sensitive ui widgets based on icon classification for android apps [270] | X. Xiao, X. Wang, Z. Cao, H. Wang, P. Gao | 2019 |
P142 | Efficiently Manifesting Asynchronous Programming Errors in Android Apps [70] | L. Fan, T. Su, S. Chen, G. Meng, Y. Liu, L. Xu, G. Pu | 2018 |
P143 | Semi-automated Discovery of Server-Based Information Oversharing Vulnerabilities in Android Applications [136] | W. Koch, A. Chaabane, M. Egele, W. Robertson, E. Kirda | 2017 |
P144 | LibID: Reliable Identification of Obfuscated Third-Party Android Libraries [294] | J. Zhang, A.R. Beresford, S.A. Kollmann | 2019 |
P145 | ADS-SA: System for Automatically Detecting Sensitive Path of Android Applications Based on Static Analysis [228] | H. Song, D. Lin, S. Zhu, W. Wanga, S. Zhang | 2019 |
P146 | CDGDroid: Android malware detection based on deep learning using CFG and DFG [273] | Z Xu, K Ren, S Qin, F Craciun | 2018 |
P147 | Machine Learning for Android Malware Detection Using Permission and API Calls [201] | N. Peiravian, X. Zhu | 2013 |
P148 | IIFA: modular inter-app intent information flow analysis of android applications [235] | A. Tiwari, S. GroSS, C. Hammer | 2019 |
P149 | Static Back-Stack Transition Analysis for Android [163] | A. Liu, C. Guo, W. Wang, Y. Qiu, J. Xu | 2019 |
P150 | Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis [72] | M. Fan, J. Liu, X. Luo, K. Chen, Z. Tian, Q. Zheng, T. Liu | 2018 |
P151 | StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification [125] | M. Junaid, J. Ming, D. Kung | 2018 |
P152 | Apkcombiner: Combining multiple android apps to support inter-app analysis [146] | L. Li, A. Bartel, T.F. Bissyandé, J. Klein, Y. Le Traon | 2015 |
P153 | Andarwin: Scalable detection of semantically similar android applications [56] | J. Crussell, C. Gibler, H. Chen | 2013 |
P154 | Appx: an automated app acceleration framework for low latency mobile app [54] | B. Choi, J. Kim, D. Cho, S. Kim, D. Han | 2018 |
P155 | Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets [49] | K. Chen, P. Liu, Y. Zhang | 2014 |
P156 | Search-Based Energy Testing of Android [56] | R. Jabbarvand, J.W. Lin, S. Malek | 2019 |
P157 | TeICC: Targeted Execution of Inter-Component Communications in Android [4] | M. Ahmad, V. Costamagna, B. Crispo, F. Bergadano | 2017 |
P158 | API compatibility issues in Android: Causes and effectiveness of data-driven detection techniques [217] | S. Scalabrino, G. Bavota, M. Linares-Vásquez, V. Piantadosi, M. Lanza, R. Oliveto | 2018 |
P159 | Androlic: an extensible flow, context, object, field, and path-sensitive static analysis framework for Android [196] | L. Pan, B. Cui, J. Yan, X. Ma, J. Yan, J. Zhang | 2019 |
P160 | EvoDroid: Segmented Evolutionary Testing of Android Apps [175] | R. Mahmood, N. Mirzaei, S. Malek | 2014 |
P161 | LibRadar: Fast and Accurate Detection of Third-party Libraries in Android Apps [174] | Z. Ma, H. Wang, Y. Guo, X. Chen | 2016 |
P162 | Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications [119] | Y.J. Jia; Q.A. Chen; Y. Lin; C. Kong; Z. Morley Mao | 2017 |
P163 | Finding flaws from password authentication code in Android apps [173] | S. Ma, E. Bertino, S. Nepal, J. Li, D. Ostry, R.H. Deng, S. Jha | 2019 |
P164 | Detecting Third-Party Libraries in Android Applications with High Precision and Recall [301] | Y. Zhang, J. Dai, X. Zhang, S. Huang, Z. Yang, M. Yang, H. Chen | 2018 |
P165 | EARMO: An Energy-Aware Refactoring Approach for Mobile Apps [184] | R. Morales, R. Saborido, F. Khomh, F. Chicano, G. Antoniol | 2018 |
P166 | DelDroid : An automated approach for determination and enforcement of least-privilege architecture in android [101] | M. Hammad, H. Bagheri, S. Malek | 2019 |
P167 | Lifting inter-app data-flow analysis to large app sets [215] | F. Sattler, A. von Rhein, T. Berger, N.S. Johansson, M.M. Hardø, S. Apel | 2018 |
P168 | Leveraging Program Analysis to Reduce User-Perceived Latency in Mobile Applications [304] | Y. Zhao, M.S. Laser, Y. Lyu, N. Medvidovic | 2018 |
P169 | Graph Embedding based Familial Analysis of Android Malware using Unsupervised Learning [73] | M. Fan, X. Luo, J. Liu, M. Wang, C. Nong, Q. Zheng, T. Liu | 2019 |
P170 | PATDroid: Permission-Aware GUI Testing of Android [212] | A. Sadeghi, R. Jabbarvand, S. Malek | 2017 |
P171 | Together Strong: Cooperative Android App Analysis [199] | F. Pauck, H. Wehrheim | 2019 |
P172 | Android testing via synthetic symbolic execution [84] | X. Gao; S.H. Tan; Z. Dong, A. Roychoudhury | 2018 |
P173 | Self-Protection of Android Systems from Inter-component Communication Attacks [100] | M. Hammad, J. Garcia, S. Malek | 2018 |
P174 | MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis [267] | W. Yueming, L. XiaoDi, Z. Deqing, Y. Wei, Z. Xin, J. Hai | 2019 |
P175 | Automated API-Usage Update for Android Apps [74] | M. Fazzini, Q. Xin, A. Orso | 2019 |
P176 | Leila: formal tool for identifying mobile malicious behaviour [46] | G. Canfora, F. Martinelli, F. Mercaldo, V. Nardone, A. Santone, C.A. Visaggio | 2018 |
P177 | Re-checking App Behavior against App Description in the Context of Third-party Libraries [288] | C. Zhang, H. Wang, R. Wang, Y. Guo, G. Xu | 2018 |
P178 | VAnDroid: A framework for vulnerability analysis of Android applications using a model-driven reverse engineering technique [190] | A. Nirumand, B. Zamani, B.T. Ladani | 2019 |
P179 | AnFlo: Detecting Anomalous Sensitive Information Flows in Android Apps [62] | B. Fisseha Demissie, M. Ceccato, L. Khin Shar | 2018 |
P180 | PaddyFrog: systematically detecting confused deputy vulnerability in Android applications [263] | J. Wu, T. Cui, T. Ban, S. Guo, L. Cui | 2015 |
P181 | Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features [293] | J. Zhang, Z. Qin, K. Zhang, H. Yin, J. Zou | 2018 |
P182 | Obfusifier: Obfuscation-resistant Android malware detection system | 2019 | |
P183 | On automatically detecting similar Android apps [158] | Z. Li, J. Sun, Q. Yan, W. Srisa-an, Y. Tsutano | 2016 |
P184 | Contextual policy enforcement in android applications with permission event graphs [50] | K.Z. Chen, N.M. Johnson, V. D’Silva, S. Dai, K. MacNamara, T. Magrino, E. Wu, M. Rinard, D. Song | 2013 |
P185 | Toward a framework for detecting privacy policy violations in android application code [226] | R. Slavin, X. Wang, M.B. Hosseini, J. Hester, R. Krishnan, J. Bhatia, T.D. Breaux, J. Niu | 2016 |
P186 | LUDroid: A large scale analysis of Android–Web hybridization [236] | A. Tiwari, J. Prakash, S. GroSS, C. Hammer | 2019 |
P187 | COVERT: Compositional Analysis of Android Inter-App Permission Leakage [20] | H. Bagheri, A. Sadeghi, J. Garcia, S. Malek | 2015 |
P188 | Data-Driven Solutions to Detect API Compatibility Issues in Android: An Empirical Study [216] | S. Scalabrino, G. Bavota, M. Linares-Vásquez, M. Lanza, R. Oliveto | 2019 |
P189 | Harvesting Developer Credentials in Android Apps [309] | Y. Zhou, L. Wu, Z. Wang, X. Jiang | 2015 |
P190 | Learning Performance Optimization from Code Changes for Android Apps [77] | R. Feng, G. Meng, X. Xie, T. Su, Y. Liu, S. Lin | 2019 |
P191 | Guided, Stochastic Model-Based GUI Testing of Android Apps [231] | T. Su, G. Meng, Y. Chen, K. Wu, W. Yang, Y. Yao, G. Pu, Y. Liu, Z. Su | 2017 |
P192 | Understanding the purpose of permission use in mobile apps [244] | H. Wang, Y. Li, Y. Guo, Y. Agarwal, J.I. Hong | 2017 |
P193 | Smv-hunter: Large scale, automated detection of ssl/tls man-in-the-middle vulnerabilities in android apps [230] | D. Sounthiraraj, J. Sahs, G. Greenwood, Z. Lin, L. Khan | 2014 |
P194 | Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection [52] | X.Chen, C. Li, D. Wang, S. Wen, J. Zhang, S. Nepal, Y. Xiang, K. Ren | 2019 |
P195 | Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware [86] | J. Garcia, M. Hammad, S. Malek | 2018 |
P196 | Who changed you? Obfuscator identification for Android [247] | Y. Wang, A. Rountev | 2017 |
P197 | Enhancing the description-to-behavior fidelity in android apps with privacy policy [286] | L. Yu, X. Luo, C. Qian, S. Wang, H.K.N. Leung | 2018 |
P198 | Static window transition graphs for Android [276] | S. Yang, H. Wu, H. Zhang, Y. Wang, C. Swaminathan, D. Yan, A. Rountev | 2018 |
P199 | An Efficient, Robust, and Scalable Approach for Analyzing Interacting Android Apps [237] | Y. Tsutano, S. Bachala, W. Srisa-An, G. Rothermel, J. Dinh | 2017 |
P200 | A Temporal Permission Analysis and Enforcement Framework for Android [213] | A. Sadeghi, R. Jabbarvand, N. Ghorbani, H. Bagheri, S. Malek | 2018 |
P201 | GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications [245] | X. Wang, X. Qin, M.B. Hosseini, R. Slavin, T. Breaux, J. Niu | 2018 |
P202 | Towards understanding and reasoning about android interoperations [18] | S. Bae, S. Lee, S. Ryu | 2019 |
P203 | OASIS: Prioritizing Static Analysis Warnings for Android Apps Based on App User Reviews [253] | L. Wei, Y. Liu, S.C. Cheung | 2017 |
P204 | ServDroid: Detecting Service Usage Inefficiencies in Android Applications [229] | W. Song, J. Zhang, J. Huang | 2019 |
P205 | TDroid: Exposing App Switching Attacks in Android with Control Flow Specialization [165] | J. Liu, D. Wu, J. Xue | 2018 |
P206 | Characterizing and identifying misexposed activities in android applications [274] | J. Yan, X. Deng, P. Wang, T. Wu, J. Yan, J. Zhang | 2018 |
P207 | OAUTHLINT: An Empirical Study on OAuth Bugs in Android Applications [5] | T. Al Rahat, Y. Feng, Y. Tian | 2019 |
P208 | Remove RATs from Your Code: Automated Optimization of Resource Inefficient Database Writes for Mobile Applications [171] | Y. Lyu, D. Li, W.G.J. Halfond | 2018 |
P209 | Systematic detection of capability leaks in stock Android smartphones [96] | M.C. Grace, Y. Zhou, Z. Wang, X. Jiang | 2012 |
P210 | Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps [250] | T. Watanabe, M. Akiyama, T. Sakai, T. Mori | 2015 |
P211 | Refactoring Android Java Code for On-Demand Computation Offloading [299] | Y. Zhang, G. Huang, X. Liu, W. Zhang, H. Mei, S. Yang | 2012 |
P212 | Jitana: A modern hybrid program analysis framework for android platforms [165] | Y. Tsutano, S. Bachala, W. Srisa-an, G. Rothermel, J. Dihn | 2019 |
P213 | DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware [307] | Y. Zhongyang, Z. Xin, B. Mao, L. Xie | 2013 |
P214 | Tackling runtime-based obfuscation in Android with TIRO [259] | M.Y. Wong, D. Lie | 2018 |
P215 | Grandroid: Graph-based detection of malicious network behaviors in android applications [157] | Z. Li, J. Sun, Q. Yan, W. Srisa-an, S. Bachala | 2018 |
P216 | ViewDroid: Towards obfuscation-resilient mobile application repackaging detection [290] | F. Zhang, H. Huang, S. Zhu, D. Wu, P. Liu | 2014 |
P217 | Towards automatic generation of security-centric descriptions for android apps [298] | M. Zhang, Y. Duan, Q. Feng, H. Yin | 2015 |
P218 | DeepIntent: Deep icon-behavior learning for detecting intention-behavior discrepancy in mobile apps [268] | S. Xi, S. Yang, X. Xiao, Y. Yao, Y. Xiong, F. Xu, H. Wang, P. Gao, Z. Liu, F. Xu, J. Lu | 2019 |
P219 | SENTINEL: generating GUI tests for sensor leaks in Android and Android wear apps [262] | H. Wu, H. Zhang, Y. Wang, A. Rountev | 2019 |
P220 | LESDroid - A Tool for Detecting Exported Service Leaks of Android Applications [172] | J. Ma, S. Liu, Y. Jiang, X. Tao, C.Xu, J. Lu | 2018 |
P221 | Static detection of energy defect patterns in Android applications [261] | H.Wu, S. Yang, A. Rountev | 2016 |
P222 | Wechecker: efficient and precise detection of privilege escalation vulnerabilities in android apps [58] | X. Cui, J. Wang, L.C.K. Hui, Z. Xie, T. Zeng, S. Yiu | 2015 |
P223 | Launch-Mode-Aware Context-Sensitive Activity Transition Analysis [302] | Y. Zhang, Y. Sui, J. Xue | 2018 |
P224 | SIG-Droid: Automated System Input Generation for Android Applications [181] | N. Mirzaei, H. Bagheri, R. Mahmood, S. Malek | 2015 |
P225 | Reducing Combinatorics in GUI Testing of Android Applications [182] | N. Mirzaei, J. Garcia, H. Bagheri, A. Sadeghi, S. Malek | 2016 |
P226 | Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification [19] | H. Bagheri, E. Kang, S. Malek, D. Jackson | 2015 |
P227 | Reliable third-party library detection in android and its security applications [17] | M. Backes, S. Bugiel, E. Derr | 2016 |
P228 | IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware [258] | M.Y. Wong, D. Lie | 2016 |
P229 | EnMobile: Entity-based Characterization and Analysis of Mobile Malware [279] | W. Yang, M.R. Prasad, T. Xie | 2018 |
P230 | Ordol: Obfuscation-Resilient Detection of Libraries in Android Applications [234] | D. Titze, M. Lux, J. Schuette | 2017 |
P231 | Towards model checking android applications [23] | G. Bai, Q. Ye, Y. Wu, H. Botha, J. Sun, Y. Liu, J. Dong, W. Visser | 2018 |
P232 | Security code smells in Android ICC [83] | P. Gadient, M. Ghafari, P. Frischknecht, O. Nierstrasz | 2019 |
P233 | Characterizing malicious Android apps by mining topic-specific data flow signatures [280] | X. Yang, D. Lo, L. Li, X. Xia, T.F. Bissyandé, J. Klein | 2017 |
P234 | Making Malory Behave Maliciously: Targeted Fuzzing of Android Execution Environments [206] | S. Rasthofer, S. Arzt, S. Triller, M. Pradel | 2017 |
P235 | DroidStar: Callback Typestates for Android Classes [205] | A. Radhakrishna, N.V. Lewchenko, S. Meier, S. Mover, K.C. Sripada, D. Zufferey, B.E. Chang, P. Cherny | 2018 |
P236 | PIVOT: Learning API-Device Correlations to Facilitate Android Compatibility Issue Detection [254] | L. Wei, Y. Liu, S.C. Cheung | 2019 |
P237 | Automatic Generation of Inter-Component Communication Exploits for Android Applications [85] | J. Garcia, M. Hammad, N. Ghorbani, S. Malek | 2017 |
P238 | Neural-augmented static analysis of Android communication [303] | J. Zhao, A. Albarghouthi, V. Rastogi, S. Jha, D. Octeau | 2018 |
P239 | Understanding and Detecting Evolution-Induced Compatibility Issues in Android Apps [106] | D. He, L. Li, L. Wang, H. Zheng, G. Li, J. Xue | 2018 |
P240 | Goal-Driven Exploration for Android Applications [137] | D. Lai, J. Rubin | 2019 |
P241 | CiD: Automating the Detection of API-related Compatibility Issues in Android Apps [152] | L. Li, T.F. Bissyandé́, H. Wang, J. Klein | 2018 |
P242 | QADroid: Regression Event Selection for Android Applications [223] | A. Sharma, R. Nasre | 2019 |
P243 | Automated analysis of privacy requirements for mobile app [310] | S. Zimmeck, Z. Wang, L. Zou, R. Iyengar, B. Liu, F. Schaub, W. Shomir, N.M. Sadeh, S.M. Bellovin, J.R. Reidenberg | 2017 |
P244 | apk2vec: Semi-supervised multi-view representation learning for profiling Android applications [188] | A. Narayanan, C. Soh, L. Chen, Y. Liu, L. Wang | 2018 |
P245 | Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications [37] | A. Bosu, F. Liu, D. Yao, G. Wang | 2017 |
P246 | Efficient, Evolutionary Security Analysis of Interacting Android Apps [22] | H. Bagheri, J. Wang, J. Aerts, S. Malek | 2018 |
P247 | Detecting Passive Content Leaks and Pollution in Android Applications [120] | Y.Z.X. Jiang, Z. Xuxian | 2013 |
P248 | Dapasa: detecting android piggybacked apps through sensitive subgraph analysis [71] | M. Fan, J. Liu, W. Wang, H. Li, Z. Tian, T. Liu | 2017 |
P249 | Orlis: Obfuscation-resilient library detection for Android [248] | Y. Wang, H. Wu, H. Zhang, A. Rountev | 2018 |
P250 | Juxtapp: A scalable system for detecting code reuse among android applications [102] | S. Hanna, L. Huang, E. Wu, S. Li, C. Chen, D. Song | 2012 |
P251 | A new android malware detection approach using bayesian classification [283] | S.Y. Yerima, S. Sezer, G. McWilliams, I. Muttik | 2013 |
P252 | Towards a Scalable Resource-driven Approach for Detecting Repackaged Android Applications [222] | Y. Shao, X. Luo, C. Qian, P. Zhu, L. Zhang | 2014 |
P253 | Efficiently Manifesting Asynchronous Programming Errors in Android Apps [70] | L. Fan, T. Su, S. Chen, G. Meng, Y. Liu, L. Xu, G. Pu | 2018 |
P254 | Automatically Discovering, Reporting and Reproducing Android Application Crashes [185] | K. Moran, M. Linares-Vásquez, C. Bernal-Cárdenas; C. Vendome; D. Poshyvanyk | 2016 |
P255 | HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving [44] | S. Calzavara, I. Grishchenko, M. Maffei | 2016 |
P256 | Android Multitasking Mechanism: Formal Semantics and Static Analysis of Apps [107] | J. He, T. Chen, P. Wang, Z. Wu, J. Yan | 2019 |
P257 | Privacy Leakage through Exploitation of Vulnerable Inter-App Communication on Android [177] | H.M.A. Maqsood, K.N. Qureshi, F. Bashir, N.U. Islam | 2019 |
P258 | Revisiting the impact of common libraries for android-related investigations [153] | L. Li, T. Riom, T.F. Bissyandé, H. Wang, J. Klein | 2019 |
P259 | Authorship attribution of Android apps [91] | H. Gonzalez, N. Stakhanova, A.A. Ghorbani | 2018 |
P260 | Improving accuracy of Android malware detection with lightweight contextual awareness [7] | J. Allen, M. Landen, S. Chaba, Y. Ji, S.P.H. Chung, W. Lee | 2018 |
P261 | Characterizing and Detecting Inefficient Image Displaying Issues in Android Apps [155] | W. Li, Y. Jiang, C. Xu, Y. Liu, X. Ma, J. Lù | 2019 |