Skip to main content

Table 4 Primary studies

From: Software engineering techniques for statically analyzing mobile apps: research trends, characteristics, and potential for industrial adoption

ID Title Authors Year
P1 NeSeDroid–Android Malware Detection Based on Network Traffic and Sensitive Resource Accessing [45] N.T. Cam, N.C.H. Phuoc 2017
P2 Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps [68] M. Eskandari, B. Kessler, M. Ahmad, A. Santana de Oliveira, B. Crispo 2017
P3 MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models [178] E. Mariconti, L. Onwuzurike, P. Andriotis, E. De Cristofaro, G. Ross, G. Stringhini 2017
P4 Ripple: Reflection Analysis for Android Apps in Incomplete Information Environments [300] Y Zhang, T Tan, Y Li, J Xue 2017
P5 AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection [75] A. Feizollah, N. B. Anuar, R. Salleh, G. Suarez, S. Furnell 2017
P6 Profiling the responsiveness of Android applications via automated resource amplification [246] Y. Wang, A. Rountev 2016
P7 Detecting Invalid Layer Combinations Using Control-Flow Analysis for Android [232] N. Suzuki, T. Kamina, K. Maruyama 2016
P8 Graph-aided directed testing of Android applications for checking runtime privacy behaviours [127] J.C.J. Keng, L. Jiang, T.K. Wee, R.K. Balan 2016
P9 Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models [124] M. Junaid, D. Liu, D. Kung 2016
P10 IacDroid: Preventing Inter-App Communication capability leaks in Android [289] D. Zhang, R. Wang, Z. Lin, D. Guo, X. Cao 2016
P11 Practical, formal synthesis and automatic enforcement of security policies for android [21] H. Bagheri, A. Sadeghi, R. Jabbarvand, S. Malek 2016
P12 CapaDroid: Detecting Capability Leak for Android Applications [265] T. Wu, Y. Yang 2016
P13 Asynchrony-aware static analysis of Android applications [183] A. Mishra, A. Kanade, Y.N. Srikant 2016
P14 Identifying Android inter app communication vulnerabilities using static and dynamic analysis [61] B.F. Demissie, D. Ghio, M. Ceccato, A. Avancini 2016
P15 Towards Automatically Generating Privacy Policy for Android Apps [287] L. Yu, T. Zhang, X. Luo, L. Xue, H. Chang 2016
P16 Revisiting the Description-to-Behavior Fidelity in Android Applications [285] L. Yu, X. Luo, C. Qian, S. Wang 2016
P17 Triggerscope: Towards detecting logic bombs in android applications [82] Y. Fratantonio, A. Bianchi, W. Robertson, E. Kirda, C. Kruegel, G. Vigna 2016
P18 Automated test generation for detection of leaks in Android applications [292] H. Zhang, H. Wu, A. Rountev 2016
P19 Automatic Construction of Callback Model for Android Application [99] C. Guo, Q. Ye, N. Dong, G. Bai, J.S. Dong, J. Xu 2016
P20 Automated energy optimization of HTTP requests for mobile applications [143] D. Li, Y. Lyu, J. Gui, W.G.J. Halfond 2016
P21 Understanding and detecting wake lock misuses for Android applications [168] Y. Liu, C. Xu, S.C. Cheung, V. Terragni 2016
P22 Taming Android fragmentation: characterizing and detecting compatibility issues for Android apps [252] L. Wei, Y. Liu, S.C. Cheung 2016
P23 Reflection-aware static analysis of Android apps [149] L. Li, T.F. Bissyandé, D. Octeau, J. Klein 2016
P24 Automated testing and notification of mobile app privacy leak-cause behaviours [126] J.C.J. Keng 2016
P25 Finding resume and restart errors in Android applications [220] Z. Shan, T. Azim, I. Neamtiu 2016
P26 DroidRA: Taming Reflection to Support Whole-ProgramAnalysis of Android Apps [148] L. Li, T.F. Bissyandé, D. Octeau, J. Klein 2016
P27 Empirical assessment of machine learning-based malware detectors for Android [8] K. Allix, T.F. Bissyandé, Q. Jérome, J. Klein, Y. Le Traon 2016
P28 Effective detection of android malware based on the usage of data flow APIs and machine learning [264] S. Wu, P. Wang, X. Li, Y. Zhang 2016
P29 On the Static Analysis of Hybrid Mobile Apps [38] A.D. Brucker, M. Herzberg 2016
P30 Towards a Generic Framework for Automating Extensive Analysis of Android Applications [150] L. Li, D. Li, A. Bartel, T.F. Bissyandé, J. Klein, Y. Le Traon 2016
P31 Static Program Analysis for Identifying Energy Bugs in Graphics-Intensive Mobile Apps [129] C.H.P. Kim, D. Kroening, M. Kwiatkowska 2016
P32 Combining static analysis with probabilistic models to enable market-scale android inter-component analysis [194] D. Octeau, S. Jha, M. Dering, P. McDaniel, A. Bartel, L. Li, Y. Le Traon 2016
P33 DroidNative: automating and optimizing detection of android native code malware variants [6] S. Alam, Z. Qu, R. Riley, Y. Chen, V. Rastogi 2016
P34 Enabling Automatic Protocol Behavior Analysis for Android Applications [131] J. Kim, H. Choi, H. Namkung, W. Choi, B. Choi, H. Hong, D. Han 2016
P35 PERUIM: Understanding Mobile Application Privacy with permission-UI Mapping [156] Y. Li, Y. Guo, X. Chen 2016
P36 HybriDroid: Static analysis framework for Android hybrid applications [138] S. Lee, J. Dolby, S. Ryu 2016
P37 StubDroid: automatic inference of precise data-flow summaries for the android framework [11] S. Arzt, E. Bodden 2016
P38 FlowMine: Android app analysis via data flow [225] L. Sinha, S. Bhandari, P. Faruki, M.S. Gaur, V. Laxmi, M. Conti 2016
P39 Debugging energy-efficiency related field failures in mobile apps [25] A. Banerjee, H.F. Guo, A. Roychoudhury 2016
P40 State-Taint Analysis for Detecting Resource Bugs [272] Z. Xu, D. Fan, S. Qin 2016
P41 Fixing Resource Leaks in Android Apps with Light-Weight Static Analysis and Low-Overhead Instrumentation [164] J. Liu, T. Wu, J. Yan, J. Zhang 2016
P42 Relda2: an effective static analysis tool for resource leak detection in Android apps[266] T. Wu, J. Liu, X. Deng, J. Yan, J. Zhang 2016
P43 Detecting energy leaks in android app with poem [79] A. Ferrari, D. Gallucci, D. Puccinelli, S. Giordano 2016
P44 Lightweight measurement and estimation of mobile ad energy consumption [97] J. Gui, D. Li, M. Wan, W.G.J. Halfond 2016
P45 AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context [278] W. Yang, X. Xiao, B. Andow, S. Li, T. Xie, W. Enck 2015
P46 Mining Apps for Abnormal Usage of Sensitive Data [15] V. Avdiienko, K. Kuznetsov, A. Gorla, A. Zeller, S. Arzt, S. Rasthofer, E. Bodden 2015
P47 CLAPP: characterizing loops in Android applications [81] Y. Fratantonio, A. Machiry, A. Bianchi, C. Kruegel, G. Vigna 2015
P48 Study and Refactoring of Android Asynchronous Programming [161] Y. Lin, S. Okur, D. Dig 2015
P49 Tracking the Software Quality of Android Applications Along Their Evolution [108] G. Hecht, O. Benomar, R. Rouvoy, N. Moha, L. Duchien 2015
P50 Covert Communication in Mobile Applications [211] J. Rubin, M.I. Gordon, N. Nguyen, M.C. Rinard 2015
P51 Static Window Transition Graphs for Android [276] S. Yang, H. Zhang, H. Wu, Y. Wang, A. Rountev 2015
P52 Static Analysis of Implicit Control Flow: Resolving Java Reflection and Android Intents [27] P. Barros, R. Just, S. Millstein, P. Vines, W. Dietl, M. D’Amorim, M.D. Ernst 2015
P53 String Analysis of Android Applications [60] J. Del Vecchio, F. Shen, K.M. Yee, B. Wang, S.Y. Ko, L. Ziarek 2015
P54 Interactively verifying absence of explicit information flows in Android apps [31] O. Bastani, S. Anand, A. Aiken 2015
P55 ShamDroid: gracefully degrading functionality in the presence of limited resource access [40] L. Brutschy, P. Ferrara, O. Tripp, M. Pistoia 2015
P56 WuKong: a scalable and accurate two-phase approach to Android app clone detection [241] H. Wang, Y. Guo, Z. Ma, X. Chen 2015
P57 Reevaluating Android Permission Gaps with Static and Dynamic Analysis [242] H. Wang, Y. Guo, Z. Tang, G. Bai, X. Chen 2015
P58 Andro-autopsy: Anti-malware system based on similarity matching of malware and malware creator-centric information [117] J. Jang, H. Kang, J. Woo, A. Mohaisen, H.K. Kim 2015
P59 EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework [47] Y. Cao, Y. Fratantonio, A. Bianchi, M. Egele, C. Kruegel, G. Vigna, Y. Chen 2015
P60 What the app is that? deception and countermeasures in the android user interface [36] A. Bianchi, J. Corbetta, L. Invernizzi, Y. Fratantonio, C. Kruegel, G. Vigna 2015
P61 Scalable and Precise Taint Analysis for Android [113] W. Huang, Y. Dong, A. Milanova, J. Dolby 2015
P62 AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications [284] L. Yu, T. Zhang, X. Luo, L. Xue 2015
P63 Information-Flow Analysis of Android Applications in DroidSafe [92] M.I. Gordon, D.Kim, J.H. Perkins, L.Gilham, N.Nguyen, M.C. Rinard 2015
P64 StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications [305] Y. Zhauniarovich, M. Ahmad, O. Gadyatskaya, B. Crispo, F. Massacci 2015
P65 Potential Component Leaks in Android Apps: An Investigation into a New Feature Set for Malware Detection [145] L. Li, K. Allix, D. Li, A. Bartel, T.F. Bissyandé, J. Klein 2015
P66 Static Control-Flow Analysis of User-Driven Callbacks in Android Applications [275] S.Yang, D.Yan, H.Wu, Y.Wang, A.Rountev 2015
P67 Composite Constant Propagation: Application to Android Inter-Component Communication Analysis [193] D. Octeau, D. Luchaup, M. Dering, S. Jha, P.D. McDaniel 2015
P68 IccTA: Detecting Inter-Component Privacy Leaks in Android Apps [147] L. Li, A. Bartel, T.F. Bissyandé, J.Klein, Y. Le Traon, S. Arzt, S. Rasthofer, E. Bodden, D. Octeau, P.D. McDaniel 2015
P69 EcoDroid: An Approach for Energy-based Ranking of Android Apps [34] R.J. Behrouz, A. Sadeghi, J. Garcia, S. Malek, P. Ammann 2015
P70 Supor: Precise and scalable sensitive user input detection for android apps [112] J. Huang, Z. Li, X. Xiao, Z. Wu, K. Lu, X. Zhang, G. Jiang 2015
P71 Uipicker: User-input privacy identification in mobile applications [186] Y. Nan, M. Yang, Z. Yang, S. Zhou, G. Gu, X. Wang 2015
P72 Andro Lyze: A Distributed Framework for Efficient Android App Analysis [33] L. Baumgärtner, P. Graubner, N. Schmidt, B. Freisleben 2015
P73 Using text mining to infer the purpose of permission use in mobile apps [243] H. Wang, J. Hong, Y. Guo 2015
P74 Static reference analysis for GUI objects in Android software [210] A. Rountev, D. Yan 2014
P75 Static analysis for independent app developers [39] L. Brutschy, P. Ferrara, P. Müller 2014
P76 Cochecker: Detecting capability and sensitive data leaks from component chains in android [57] X. Cui, D. Yu, P.P.F. Chan, L.C.K. Hui, S.M. Yiu, S. Qing 2014
P77 Android Taint Flow Analysis for App Sets [135] W. Klieber, L. Flynn, A. Bhosale, L. Jia, L. Bauer 2014
P78 Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps [251] F. Wei, S. Roy, X. Ou, Robby 2014
P79 AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications [295] M. Zhang, H. Yin 2014
P80 Semantics-aware android malware classification using weighted contextual api dependency graphs [297] M. Zhang, Y. Duan, H. Yin, Z. Zhao 2014
P81 DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket [10] D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, K. Rieck 2014
P82 Retrofitting concurrency for android applications through refactoring [160] Y. Lin, C. Radoi, D. Dig 2014
P83 Checking app behavior against app descriptions [93] A. Gorla, I. Tavecchia, F. Gross, A. Zeller 2014
P84 Information Flows As a Permission Mechanism [224] F. Shen, N. Vishnubhotla, C. Todarka, M. Arora, B. Dhandapani, E.J. Lehner, S.Y. Ko, L. Ziarek 2014
P85 Greendroid: Automated diagnosis of energy inefficiency for smartphone applications [167] Y. Liu, C. Xu, S.C. Cheung, J. Lu 2014
P86 FlowDroid: Precise context-,flow-,field-,object-sensitive and lifecycle-aware taint analysis for android apps [12] S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, P.D. McDaniel 2014
P87 Cassandra: Towards a Certifying App Store for Android [169] S. Lortz, H. Mantel, A. Starostin, T. Bähr, D. Schneider, A. Weber 2014
P88 Code Injection Attacks on HTML5-based Mobile Apps:Characterization, Detection and Mitigation [121] X. Jin, X. Hu, K. Ying, W. Du, H. Yin, G. Nagesh Peri 2014
P89 Efficient, context-aware privacy leakage confinement for android applications without firmware modding [296] M. Zhang, H. Yin 2014
P90 Collaborative Verification of Information Flow for a High-Assurance App Store [67] M.D. Ernst, R. Just, S. Millstein, W. Dietl, S. Pernsteiner, F. Roesner, K. Koscher, P. Barros, R. Bhoraskar, S. Han, P. Vines, E.X. Wu 2014
P91 Multi-App Security Analysis with FUSE: Statically Detecting Android App Collusion [207] T. Ravitch, E.R. Creswick, A. Tomb, A. Foltzer, T. Elliott, L. Casburn 2014
P92 Characterizing and detecting performance bugs for smartphone applications [166] Y. Liu, C. Xu, S.C. Cheung 2014
P93 AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction [111] J. Huang, X. Zhang, L. Tan, P. Wang, B. Liang 2014
P94 Apposcopy: semantics-based detection of Android malware through static analysis [78] Y. Feng, S. Anand, I. Dillig, A. Aiken 2014
P95 Detecting energy bugs and hotspots in mobile apps [24] A. Banerjee, L.K. Chong, S. Chattopadhyay, A. Roychoudhury 2014
P96 Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges and Solutions for Analyzing Android [29] A. Bartel, J. Klein, M. Monperrus, Y. Le Traon 2014
P97 Responsiveness analysis tool for android application [195] T. Ongkosit, S. Takada 2014
P98 Automatically exploiting potential component leaks in android applications [144] L. Li, A. Bartel, J. Klein, Y. Le Traon 2014
P99 Effective inter-component communication mapping in android: An essential step towards holistic security analysis [192] D. Octeau, P.D. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, Y. Le Traon 2013
P100 DroidAPIMiner: Mining API-level features for robust malware detection in android [1] Y. Aafer, W. Du, H. Yin 2013
P101 An empirical study of cryptographic misuse in android applications [64] M. Egele, D. Brumley, Y. Fratantonio, C. Kruegel 2013
P102 Targeted and depth-first exploration for systematic testing of android apps [16] T. Azim, I. Neamtiu 2013
P103 Sound and precise malware analysis for android via pushdown reachability and entry-point saturation [159] S. Liang, A.W. Keep, M. Might, S. Lyde, T. Gilray, Liang, S., Keep, A. W., Might, M., Lyde, S., Gilray, T., P. Aldous, D. Van Horn 2013
P104 AppIntent: analyzing sensitive data transmission in android for privacy leakage detection [282] Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, X.S. Wang 2013
P105 AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users [209] S. Rosen, Z. Qian, Z.M. Mao 2013
P106 Flow permissions for android [110] S. Holavanalli, D. Manuel, V. Nanjundaswamy, B. Rosenberg, F. Shen, S.Y. Ko, L. Ziarek 2013
P107 Slicing Droids: Program Slicing for Smali Code [109] J. Hoffmann, M. Ussath, T. Holz, M. Spreitzenbarth 2013
P108 A grey-box approach for automated GUI-model generation of mobile applications [277] W. Yang, M.R. Prasad, T. Xie 2013
P109 Structural detection of android malware using embedded call graphs [88] H. Gascon, F. Yamaguchi, D. Arp, K. Rieck 2013
P110 Estimating mobile application energy consumption using program analysis [104] S. Hao, D. Li, W.G.J. Halfond, R. Govindan 2013
P111 Characterizing and detecting resource leaks in Android applications [98] C. Guo, J. Zhang, J. Yan, Z. Zhang, Y. Zhang 2013
P112 Calculating source line level energy information for Android applications [142] D. Li, S. Hao, W.G.J. Halfond, R. Govindan 2013
P113 Smartdroid: an automatic system for revealing ui-based trigger conditions in android applications [306] C. Zheng, S. Zhu, S. Dai, G. Gu, X. Gong, X. Han, W. Zou 2012
P114 Why Eve and Mallory love Android: An analysis of Android SSL (in) security [69] S. Fahl, M. Harbach, T. Muders, M. Smith, L. Baumgärtner, B. Freisleben 2012
P115 User-aware privacy control via extended static-information-flow analysis [269] X. Xiao, N. Tillmann, M. Fähndrich, J. De Halleux, M. Moskal 2012
P116 Dr. Android and Mr. Hide: fine-grained permissions in android applications [118] J. Jeon, K. K. Micinski, J. A. Vaughan, A. Fogel, N. Reddy, J. S. Foster, T. D. Millstein 2012
P117 LeakMiner: Detect Information Leakage on Android with Static Taint Analysis [281] Z. Yang, M. Yang 2012
P118 SCANDAL: Static Analyzer for Detecting Privacy Leaks in Android Applications [130] J. Kim, Y. Yoon, K. Yi, J. Shin, S. Center 2012
P119 A framework for static detection of privacy leaks in android applications [176] C. Mann, A. Starostin 2012
P120 DroidChecker: analyzing android applications for capability leak [48] P.P.F. Chan, L. C. K. Hui, S. M. Yiu 2012
P121 DroidMat: Android Malware Detection through Manifest and API Calls Tracing [260] D.J. Wu, C.H. Mao, T.E. Wei, H.M. Lee, K.P. Wu 2012
P122 Static analysis of Android programs [200] E. Payet, F. Spoto 2012
P123 Estimating Android applications’ CPU energy usage via bytecode profiling [103] H. Hao, D. Li, W. G. J. Halfond, R. Govindan 2012
P124 What is keeping my phone awake?: characterizing and detecting no-sleep energy bugs in smartphone apps [198] A. Pathak, A. Jindal, Y. Charlie Hu, S. P. Midkiff 2012
P125 User-centric dependence analysis for identifying malicious mobile apps [66] K.O. Elish, D. Yao, B.G. Ryder 2012
P126 AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale [90] C. Gibler, J. Crussell, J. Erickson, H. Chen 2012
P127 Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. [308] Y. Zhou, Z. Wang, W. Zhou, X. Jiang 2012
P128 RiskRanker: Scalable and Accurate Zero-day Android Malware Detection [95] M.C. Grace, Y.Zhou, Q. Zhang, S. Zou, X. Jiang 2012
P129 Chex: statically vetting android apps for component hijacking vulnerabilities [170] L. Lu, Z. Li, Z. Wu, W. Lee, G. Jiang 2012
P130 Automatically securing permission-based software by reducing the attack surface: An application to android [28] A. Bartel, J. Klein, Y. Le Traon, M. Monperrus 2012
P131 Android permissions demystified [76] A. Porter Felt, E. Chin, S. Hanna, D. Song, D. A. Wagner: 2011
P132 Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications [32] L. Batyuk, M. Herpich, S. A. Çamtepe, K. Raddatz, A. D. Schmidt, S. Albayrak 2011
P133 Analyzing Inter-application Communication in Android [53] E. Chin, A. Porter Felt, K. Greenwood, D. A. Wagner 2011
P134 PiOS: Detecting Privacy Leaks in iOS Applications [63] M. Egele, C. Kruegel, E. Kirda, G. Vigna 2011
P135 Energypatch: Repairing resource leaks to improve energy-efficiency of android apps [26] A. Banerjee, L. K. Chong, C. Ballabriga, A. Roychoudhury 2018
P136 A multi-view context-aware approach to Android malware detection and malicious code localization [187] A. Narayanan, M. Chandramohan, L. Chen, Y. Liu 2018
P137 AndroidOff:Offloading android application based on cost estimation [51] X. Chen, J. Chen, B. Liu, Y. Ma, Y. Zhang, H. Zhong 2019
P138 A SEALANT for Inter-App Security Holes in Android [139] Y.K. Lee, J.Y. Bang, G. Safi, A. Shahbazian, Y. Zhao, N. Medvidovic 2017
P139 LibD: Scalable and Precise Third-party Library Detection in Android Markets [154] M. Li, W. Wang, P. Wang, S. Wang, D. Wu, J. Liu, R. Xue, W. Huo 2017
P140 Self-Hiding Behavior in Android Apps: Detection and Characterization [221] Z. Shan, I.G. Neamtiu, S. Raina 2018
P141 Iconintent: automatic identification of sensitive ui widgets based on icon classification for android apps [270] X. Xiao, X. Wang, Z. Cao, H. Wang, P. Gao 2019
P142 Efficiently Manifesting Asynchronous Programming Errors in Android Apps [70] L. Fan, T. Su, S. Chen, G. Meng, Y. Liu, L. Xu, G. Pu 2018
P143 Semi-automated Discovery of Server-Based Information Oversharing Vulnerabilities in Android Applications [136] W. Koch, A. Chaabane, M. Egele, W. Robertson, E. Kirda 2017
P144 LibID: Reliable Identification of Obfuscated Third-Party Android Libraries [294] J. Zhang, A.R. Beresford, S.A. Kollmann 2019
P145 ADS-SA: System for Automatically Detecting Sensitive Path of Android Applications Based on Static Analysis [228] H. Song, D. Lin, S. Zhu, W. Wanga, S. Zhang 2019
P146 CDGDroid: Android malware detection based on deep learning using CFG and DFG [273] Z Xu, K Ren, S Qin, F Craciun 2018
P147 Machine Learning for Android Malware Detection Using Permission and API Calls [201] N. Peiravian, X. Zhu 2013
P148 IIFA: modular inter-app intent information flow analysis of android applications [235] A. Tiwari, S. GroSS, C. Hammer 2019
P149 Static Back-Stack Transition Analysis for Android [163] A. Liu, C. Guo, W. Wang, Y. Qiu, J. Xu 2019
P150 Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis [72] M. Fan, J. Liu, X. Luo, K. Chen, Z. Tian, Q. Zheng, T. Liu 2018
P151 StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification [125] M. Junaid, J. Ming, D. Kung 2018
P152 Apkcombiner: Combining multiple android apps to support inter-app analysis [146] L. Li, A. Bartel, T.F. Bissyandé, J. Klein, Y. Le Traon 2015
P153 Andarwin: Scalable detection of semantically similar android applications [56] J. Crussell, C. Gibler, H. Chen 2013
P154 Appx: an automated app acceleration framework for low latency mobile app [54] B. Choi, J. Kim, D. Cho, S. Kim, D. Han 2018
P155 Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets [49] K. Chen, P. Liu, Y. Zhang 2014
P156 Search-Based Energy Testing of Android [56] R. Jabbarvand, J.W. Lin, S. Malek 2019
P157 TeICC: Targeted Execution of Inter-Component Communications in Android [4] M. Ahmad, V. Costamagna, B. Crispo, F. Bergadano 2017
P158 API compatibility issues in Android: Causes and effectiveness of data-driven detection techniques [217] S. Scalabrino, G. Bavota, M. Linares-Vásquez, V. Piantadosi, M. Lanza, R. Oliveto 2018
P159 Androlic: an extensible flow, context, object, field, and path-sensitive static analysis framework for Android [196] L. Pan, B. Cui, J. Yan, X. Ma, J. Yan, J. Zhang 2019
P160 EvoDroid: Segmented Evolutionary Testing of Android Apps [175] R. Mahmood, N. Mirzaei, S. Malek 2014
P161 LibRadar: Fast and Accurate Detection of Third-party Libraries in Android Apps [174] Z. Ma, H. Wang, Y. Guo, X. Chen 2016
P162 Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications [119] Y.J. Jia; Q.A. Chen; Y. Lin; C. Kong; Z. Morley Mao 2017
P163 Finding flaws from password authentication code in Android apps [173] S. Ma, E. Bertino, S. Nepal, J. Li, D. Ostry, R.H. Deng, S. Jha 2019
P164 Detecting Third-Party Libraries in Android Applications with High Precision and Recall [301] Y. Zhang, J. Dai, X. Zhang, S. Huang, Z. Yang, M. Yang, H. Chen 2018
P165 EARMO: An Energy-Aware Refactoring Approach for Mobile Apps [184] R. Morales, R. Saborido, F. Khomh, F. Chicano, G. Antoniol 2018
P166 DelDroid : An automated approach for determination and enforcement of least-privilege architecture in android [101] M. Hammad, H. Bagheri, S. Malek 2019
P167 Lifting inter-app data-flow analysis to large app sets [215] F. Sattler, A. von Rhein, T. Berger, N.S. Johansson, M.M. Hardø, S. Apel 2018
P168 Leveraging Program Analysis to Reduce User-Perceived Latency in Mobile Applications [304] Y. Zhao, M.S. Laser, Y. Lyu, N. Medvidovic 2018
P169 Graph Embedding based Familial Analysis of Android Malware using Unsupervised Learning [73] M. Fan, X. Luo, J. Liu, M. Wang, C. Nong, Q. Zheng, T. Liu 2019
P170 PATDroid: Permission-Aware GUI Testing of Android [212] A. Sadeghi, R. Jabbarvand, S. Malek 2017
P171 Together Strong: Cooperative Android App Analysis [199] F. Pauck, H. Wehrheim 2019
P172 Android testing via synthetic symbolic execution [84] X. Gao; S.H. Tan; Z. Dong, A. Roychoudhury 2018
P173 Self-Protection of Android Systems from Inter-component Communication Attacks [100] M. Hammad, J. Garcia, S. Malek 2018
P174 MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis [267] W. Yueming, L. XiaoDi, Z. Deqing, Y. Wei, Z. Xin, J. Hai 2019
P175 Automated API-Usage Update for Android Apps [74] M. Fazzini, Q. Xin, A. Orso 2019
P176 Leila: formal tool for identifying mobile malicious behaviour [46] G. Canfora, F. Martinelli, F. Mercaldo, V. Nardone, A. Santone, C.A. Visaggio 2018
P177 Re-checking App Behavior against App Description in the Context of Third-party Libraries [288] C. Zhang, H. Wang, R. Wang, Y. Guo, G. Xu 2018
P178 VAnDroid: A framework for vulnerability analysis of Android applications using a model-driven reverse engineering technique [190] A. Nirumand, B. Zamani, B.T. Ladani 2019
P179 AnFlo: Detecting Anomalous Sensitive Information Flows in Android Apps [62] B. Fisseha Demissie, M. Ceccato, L. Khin Shar 2018
P180 PaddyFrog: systematically detecting confused deputy vulnerability in Android applications [263] J. Wu, T. Cui, T. Ban, S. Guo, L. Cui 2015
P181 Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features [293] J. Zhang, Z. Qin, K. Zhang, H. Yin, J. Zou 2018
P182 Obfusifier: Obfuscation-resistant Android malware detection system   2019
P183 On automatically detecting similar Android apps [158] Z. Li, J. Sun, Q. Yan, W. Srisa-an, Y. Tsutano 2016
P184 Contextual policy enforcement in android applications with permission event graphs [50] K.Z. Chen, N.M. Johnson, V. D’Silva, S. Dai, K. MacNamara, T. Magrino, E. Wu, M. Rinard, D. Song 2013
P185 Toward a framework for detecting privacy policy violations in android application code [226] R. Slavin, X. Wang, M.B. Hosseini, J. Hester, R. Krishnan, J. Bhatia, T.D. Breaux, J. Niu 2016
P186 LUDroid: A large scale analysis of Android–Web hybridization [236] A. Tiwari, J. Prakash, S. GroSS, C. Hammer 2019
P187 COVERT: Compositional Analysis of Android Inter-App Permission Leakage [20] H. Bagheri, A. Sadeghi, J. Garcia, S. Malek 2015
P188 Data-Driven Solutions to Detect API Compatibility Issues in Android: An Empirical Study [216] S. Scalabrino, G. Bavota, M. Linares-Vásquez, M. Lanza, R. Oliveto 2019
P189 Harvesting Developer Credentials in Android Apps [309] Y. Zhou, L. Wu, Z. Wang, X. Jiang 2015
P190 Learning Performance Optimization from Code Changes for Android Apps [77] R. Feng, G. Meng, X. Xie, T. Su, Y. Liu, S. Lin 2019
P191 Guided, Stochastic Model-Based GUI Testing of Android Apps [231] T. Su, G. Meng, Y. Chen, K. Wu, W. Yang, Y. Yao, G. Pu, Y. Liu, Z. Su 2017
P192 Understanding the purpose of permission use in mobile apps [244] H. Wang, Y. Li, Y. Guo, Y. Agarwal, J.I. Hong 2017
P193 Smv-hunter: Large scale, automated detection of ssl/tls man-in-the-middle vulnerabilities in android apps [230] D. Sounthiraraj, J. Sahs, G. Greenwood, Z. Lin, L. Khan 2014
P194 Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection [52] X.Chen, C. Li, D. Wang, S. Wen, J. Zhang, S. Nepal, Y. Xiang, K. Ren 2019
P195 Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware [86] J. Garcia, M. Hammad, S. Malek 2018
P196 Who changed you? Obfuscator identification for Android [247] Y. Wang, A. Rountev 2017
P197 Enhancing the description-to-behavior fidelity in android apps with privacy policy [286] L. Yu, X. Luo, C. Qian, S. Wang, H.K.N. Leung 2018
P198 Static window transition graphs for Android [276] S. Yang, H. Wu, H. Zhang, Y. Wang, C. Swaminathan, D. Yan, A. Rountev 2018
P199 An Efficient, Robust, and Scalable Approach for Analyzing Interacting Android Apps [237] Y. Tsutano, S. Bachala, W. Srisa-An, G. Rothermel, J. Dinh 2017
P200 A Temporal Permission Analysis and Enforcement Framework for Android [213] A. Sadeghi, R. Jabbarvand, N. Ghorbani, H. Bagheri, S. Malek 2018
P201 GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications [245] X. Wang, X. Qin, M.B. Hosseini, R. Slavin, T. Breaux, J. Niu 2018
P202 Towards understanding and reasoning about android interoperations [18] S. Bae, S. Lee, S. Ryu 2019
P203 OASIS: Prioritizing Static Analysis Warnings for Android Apps Based on App User Reviews [253] L. Wei, Y. Liu, S.C. Cheung 2017
P204 ServDroid: Detecting Service Usage Inefficiencies in Android Applications [229] W. Song, J. Zhang, J. Huang 2019
P205 TDroid: Exposing App Switching Attacks in Android with Control Flow Specialization [165] J. Liu, D. Wu, J. Xue 2018
P206 Characterizing and identifying misexposed activities in android applications [274] J. Yan, X. Deng, P. Wang, T. Wu, J. Yan, J. Zhang 2018
P207 OAUTHLINT: An Empirical Study on OAuth Bugs in Android Applications [5] T. Al Rahat, Y. Feng, Y. Tian 2019
P208 Remove RATs from Your Code: Automated Optimization of Resource Inefficient Database Writes for Mobile Applications [171] Y. Lyu, D. Li, W.G.J. Halfond 2018
P209 Systematic detection of capability leaks in stock Android smartphones [96] M.C. Grace, Y. Zhou, Z. Wang, X. Jiang 2012
P210 Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps [250] T. Watanabe, M. Akiyama, T. Sakai, T. Mori 2015
P211 Refactoring Android Java Code for On-Demand Computation Offloading [299] Y. Zhang, G. Huang, X. Liu, W. Zhang, H. Mei, S. Yang 2012
P212 Jitana: A modern hybrid program analysis framework for android platforms [165] Y. Tsutano, S. Bachala, W. Srisa-an, G. Rothermel, J. Dihn 2019
P213 DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware [307] Y. Zhongyang, Z. Xin, B. Mao, L. Xie 2013
P214 Tackling runtime-based obfuscation in Android with TIRO [259] M.Y. Wong, D. Lie 2018
P215 Grandroid: Graph-based detection of malicious network behaviors in android applications [157] Z. Li, J. Sun, Q. Yan, W. Srisa-an, S. Bachala 2018
P216 ViewDroid: Towards obfuscation-resilient mobile application repackaging detection [290] F. Zhang, H. Huang, S. Zhu, D. Wu, P. Liu 2014
P217 Towards automatic generation of security-centric descriptions for android apps [298] M. Zhang, Y. Duan, Q. Feng, H. Yin 2015
P218 DeepIntent: Deep icon-behavior learning for detecting intention-behavior discrepancy in mobile apps [268] S. Xi, S. Yang, X. Xiao, Y. Yao, Y. Xiong, F. Xu, H. Wang, P. Gao, Z. Liu, F. Xu, J. Lu 2019
P219 SENTINEL: generating GUI tests for sensor leaks in Android and Android wear apps [262] H. Wu, H. Zhang, Y. Wang, A. Rountev 2019
P220 LESDroid - A Tool for Detecting Exported Service Leaks of Android Applications [172] J. Ma, S. Liu, Y. Jiang, X. Tao, C.Xu, J. Lu 2018
P221 Static detection of energy defect patterns in Android applications [261] H.Wu, S. Yang, A. Rountev 2016
P222 Wechecker: efficient and precise detection of privilege escalation vulnerabilities in android apps [58] X. Cui, J. Wang, L.C.K. Hui, Z. Xie, T. Zeng, S. Yiu 2015
P223 Launch-Mode-Aware Context-Sensitive Activity Transition Analysis [302] Y. Zhang, Y. Sui, J. Xue 2018
P224 SIG-Droid: Automated System Input Generation for Android Applications [181] N. Mirzaei, H. Bagheri, R. Mahmood, S. Malek 2015
P225 Reducing Combinatorics in GUI Testing of Android Applications [182] N. Mirzaei, J. Garcia, H. Bagheri, A. Sadeghi, S. Malek 2016
P226 Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification [19] H. Bagheri, E. Kang, S. Malek, D. Jackson 2015
P227 Reliable third-party library detection in android and its security applications [17] M. Backes, S. Bugiel, E. Derr 2016
P228 IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware [258] M.Y. Wong, D. Lie 2016
P229 EnMobile: Entity-based Characterization and Analysis of Mobile Malware [279] W. Yang, M.R. Prasad, T. Xie 2018
P230 Ordol: Obfuscation-Resilient Detection of Libraries in Android Applications [234] D. Titze, M. Lux, J. Schuette 2017
P231 Towards model checking android applications [23] G. Bai, Q. Ye, Y. Wu, H. Botha, J. Sun, Y. Liu, J. Dong, W. Visser 2018
P232 Security code smells in Android ICC [83] P. Gadient, M. Ghafari, P. Frischknecht, O. Nierstrasz 2019
P233 Characterizing malicious Android apps by mining topic-specific data flow signatures [280] X. Yang, D. Lo, L. Li, X. Xia, T.F. Bissyandé, J. Klein 2017
P234 Making Malory Behave Maliciously: Targeted Fuzzing of Android Execution Environments [206] S. Rasthofer, S. Arzt, S. Triller, M. Pradel 2017
P235 DroidStar: Callback Typestates for Android Classes [205] A. Radhakrishna, N.V. Lewchenko, S. Meier, S. Mover, K.C. Sripada, D. Zufferey, B.E. Chang, P. Cherny 2018
P236 PIVOT: Learning API-Device Correlations to Facilitate Android Compatibility Issue Detection [254] L. Wei, Y. Liu, S.C. Cheung 2019
P237 Automatic Generation of Inter-Component Communication Exploits for Android Applications [85] J. Garcia, M. Hammad, N. Ghorbani, S. Malek 2017
P238 Neural-augmented static analysis of Android communication [303] J. Zhao, A. Albarghouthi, V. Rastogi, S. Jha, D. Octeau 2018
P239 Understanding and Detecting Evolution-Induced Compatibility Issues in Android Apps [106] D. He, L. Li, L. Wang, H. Zheng, G. Li, J. Xue 2018
P240 Goal-Driven Exploration for Android Applications [137] D. Lai, J. Rubin 2019
P241 CiD: Automating the Detection of API-related Compatibility Issues in Android Apps [152] L. Li, T.F. Bissyandé́, H. Wang, J. Klein 2018
P242 QADroid: Regression Event Selection for Android Applications [223] A. Sharma, R. Nasre 2019
P243 Automated analysis of privacy requirements for mobile app [310] S. Zimmeck, Z. Wang, L. Zou, R. Iyengar, B. Liu, F. Schaub, W. Shomir, N.M. Sadeh, S.M. Bellovin, J.R. Reidenberg 2017
P244 apk2vec: Semi-supervised multi-view representation learning for profiling Android applications [188] A. Narayanan, C. Soh, L. Chen, Y. Liu, L. Wang 2018
P245 Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications [37] A. Bosu, F. Liu, D. Yao, G. Wang 2017
P246 Efficient, Evolutionary Security Analysis of Interacting Android Apps [22] H. Bagheri, J. Wang, J. Aerts, S. Malek 2018
P247 Detecting Passive Content Leaks and Pollution in Android Applications [120] Y.Z.X. Jiang, Z. Xuxian 2013
P248 Dapasa: detecting android piggybacked apps through sensitive subgraph analysis [71] M. Fan, J. Liu, W. Wang, H. Li, Z. Tian, T. Liu 2017
P249 Orlis: Obfuscation-resilient library detection for Android [248] Y. Wang, H. Wu, H. Zhang, A. Rountev 2018
P250 Juxtapp: A scalable system for detecting code reuse among android applications [102] S. Hanna, L. Huang, E. Wu, S. Li, C. Chen, D. Song 2012
P251 A new android malware detection approach using bayesian classification [283] S.Y. Yerima, S. Sezer, G. McWilliams, I. Muttik 2013
P252 Towards a Scalable Resource-driven Approach for Detecting Repackaged Android Applications [222] Y. Shao, X. Luo, C. Qian, P. Zhu, L. Zhang 2014
P253 Efficiently Manifesting Asynchronous Programming Errors in Android Apps [70] L. Fan, T. Su, S. Chen, G. Meng, Y. Liu, L. Xu, G. Pu 2018
P254 Automatically Discovering, Reporting and Reproducing Android Application Crashes [185] K. Moran, M. Linares-Vásquez, C. Bernal-Cárdenas; C. Vendome; D. Poshyvanyk 2016
P255 HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving [44] S. Calzavara, I. Grishchenko, M. Maffei 2016
P256 Android Multitasking Mechanism: Formal Semantics and Static Analysis of Apps [107] J. He, T. Chen, P. Wang, Z. Wu, J. Yan 2019
P257 Privacy Leakage through Exploitation of Vulnerable Inter-App Communication on Android [177] H.M.A. Maqsood, K.N. Qureshi, F. Bashir, N.U. Islam 2019
P258 Revisiting the impact of common libraries for android-related investigations [153] L. Li, T. Riom, T.F. Bissyandé, H. Wang, J. Klein 2019
P259 Authorship attribution of Android apps [91] H. Gonzalez, N. Stakhanova, A.A. Ghorbani 2018
P260 Improving accuracy of Android malware detection with lightweight contextual awareness [7] J. Allen, M. Landen, S. Chaba, Y. Ji, S.P.H. Chung, W. Lee 2018
P261 Characterizing and Detecting Inefficient Image Displaying Issues in Android Apps [155] W. Li, Y. Jiang, C. Xu, Y. Liu, X. Ma, J. Lù 2019