A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software

In parallel with the meteoric rise of mobile software, we are witnessing an alarming escalation in the number and sophistication of the security threats targeted at mobile platforms, particularly Android, as the dominant platform. While existing research has made significant progress towards detection and mitigation of Android security, gaps and challenges remain. This paper contributes a comprehensive taxonomy to classify and characterize the state-of-the-art research in this area. We have carefully followed the systematic literature review process, and analyzed the results of more than 300 research papers, resulting in the most comprehensive and elaborate investigation of the literature in this area of research. The systematic analysis of the research literature has revealed patterns, trends, and gaps in the existing literature, and underlined key challenges and opportunities that will shape the focus of future research efforts.

[1]  Ninghui Li,et al.  Generating Summary Risk Scores for Mobile Applications , 2014, IEEE Transactions on Dependable and Secure Computing.

[2]  Malcolm Hall,et al.  ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.

[3]  Chao Yang,et al.  DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications , 2014, ESORICS.

[4]  Yuewu Wang,et al.  DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices , 2015, NDSS.

[5]  David A. Wagner,et al.  Android Permissions Remystified: A Field Study on Contextual Integrity , 2015, USENIX Security Symposium.

[6]  John C. S. Lui,et al.  DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[7]  Norman Hardy,et al.  The Confused Deputy: (or why capabilities might have been invented) , 1988, OPSR.

[8]  Aaron Tomb,et al.  Multi-App Security Analysis with FUSE: Statically Detecting Android App Collusion , 2014, PPREW-4.

[9]  Hao Chen,et al.  AnDarwin: Scalable Detection of Semantically Similar Android Applications , 2013, ESORICS.

[10]  Ninghui Li,et al.  Android permissions: a perspective combining risks and benefits , 2012, SACMAT '12.

[11]  Lulu Zhang,et al.  Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme , 2014, SecureComm.

[12]  Yifan Yu,et al.  MobSafe: cloud computing based forensic analysis for massive mobile applications using data mining , 2013 .

[13]  Sehun Kim,et al.  A Malicious Application Detection Framework using Automatic Feature Extraction Tool on Android Market , 2013 .

[14]  Heng Yin,et al.  Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation , 2014, CCS.

[15]  Xiao Zhang,et al.  Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References , 2015, CCS.

[16]  Tadayoshi Kohno,et al.  Securing Embedded User Interfaces: Android and Beyond , 2013, USENIX Security Symposium.

[17]  Christopher Krügel,et al.  Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications , 2014, NDSS.

[18]  Yajin Zhou,et al.  Detecting Passive Content Leaks and Pollution in Android Applications , 2013, NDSS.

[19]  Elisa Bertino,et al.  IdentiDroid: Android can finally Wear its Anonymous Suit , 2014, Trans. Data Priv..

[20]  Sakir Sezer,et al.  A New Android Malware Detection Approach Using Bayesian Classification , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).

[21]  Eric Medvet,et al.  Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[22]  William Enck,et al.  Preventing accidental data disclosure in modern operating systems , 2013, CCS.

[23]  Tilo Müller,et al.  PANDORA applies non-deterministic obfuscation randomly to Android , 2013, 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE).

[24]  Vijay Laxmi,et al.  A robust dynamic analysis system preventing SandBox detection by Android malware , 2015, SIN.

[25]  Suman Nath,et al.  Brahmastra: Driving Apps to Test the Security of Third-Party Components , 2014, USENIX Security Symposium.

[26]  Ahmad-Reza Sadeghi,et al.  Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.

[27]  Ross J. Anderson,et al.  Aurasium: Practical Policy Enforcement for Android Applications , 2012, USENIX Security Symposium.

[28]  Urs Hengartner,et al.  PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices , 2015, SPSM@CCS.

[29]  Gonzalo Álvarez,et al.  MAMA: MANIFEST ANALYSIS FOR MALWARE DETECTION IN ANDROID , 2013, Cybern. Syst..

[30]  Srinivas Mukkamala,et al.  Mobile malware visual analytics and similarities of Attack Toolkits (Malware gene analysis) , 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS).

[31]  Gabi Dreo Rodosek,et al.  Towards Permission-Based Attestation for the Android Platform - (Short Paper) , 2011, TRUST.

[32]  René Rydhof Hansen,et al.  Formalisation and analysis of Dalvik bytecode , 2014, Sci. Comput. Program..

[33]  Muttukrishnan Rajarajan,et al.  Android Security: A Survey of Issues, Malware Penetration, and Defenses , 2015, IEEE Communications Surveys & Tutorials.

[34]  Patrice Godefroid,et al.  Automated Whitebox Fuzz Testing , 2008, NDSS.

[35]  Mads Dam,et al.  TreeDroid: a tree automaton based approach to enforcing data processing policies , 2012, CCS '12.

[36]  Stefan Kraxberger,et al.  Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) , 2016, Secur. Commun. Networks.

[37]  Chao Yang,et al.  Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps , 2015, SecureComm.

[38]  Sotiris Ioannidis,et al.  Rage against the virtual machine: hindering dynamic analysis of Android malware , 2014, EuroSec '14.

[39]  Siu-Ming Yiu,et al.  CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android , 2014, ACISP.

[40]  Valerio Costamagna,et al.  ARTDroid: A Virtual-Method Hooking Framework on Android ART Runtime , 2016, IMPS@ESSoS.

[41]  Xuxian Jiang,et al.  A Static Assurance Analysis of Android Applications , 2013 .

[42]  Shanqing Guo,et al.  Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps , 2015, AsiaCCS.

[43]  Barbara G. Ryder,et al.  User-Centric Dependence Analysis For Identifying Malicious Mobile Apps , 2012 .

[44]  John C. S. Lui,et al.  ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems , 2012, DIMVA.

[45]  Eric Medvet,et al.  Detecting Android malware using sequences of system calls , 2015, DeMobile@SIGSOFT FSE.

[46]  Ludovic Apvrille,et al.  Identifying Unknown Android Malware with Feature Extractions and Classification Techniques , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[47]  William Enck,et al.  PREC: practical root exploit containment for android devices , 2014, CODASPY '14.

[48]  Liang Gu,et al.  Context-Aware Usage Control for Android , 2010, SecureComm.

[49]  Haoyu Wang,et al.  WuKong: a scalable and accurate two-phase approach to Android app clone detection , 2015, ISSTA.

[50]  Tongxin Li,et al.  Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services , 2014, CCS.

[51]  Yuan Zhang,et al.  Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.

[52]  Fabio Massacci,et al.  StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications , 2015, CODASPY.

[53]  Patrick D. McDaniel,et al.  Porscha: policy oriented secure content handling in Android , 2010, ACSAC '10.

[54]  Jie Liu,et al.  DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps , 2014, NSDI.

[55]  Rui Wang,et al.  Unauthorized origin crossing on mobile platforms: threats and mitigation , 2013, CCS.

[56]  Yajin Zhou,et al.  RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.

[57]  Mansour Ahmadi,et al.  Clustering android malware families by http traffic , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).

[58]  Tao Xie,et al.  WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.

[59]  Muttukrishnan Rajarajan,et al.  Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[60]  P. Vinod,et al.  Droid permission miner: Mining prominent permissions for Android malware analysis , 2014, The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014).

[61]  Sahin Albayrak,et al.  Static Analysis of Executables for Collaborative Malware Detection on Android , 2009, 2009 IEEE International Conference on Communications.

[62]  Olga Gadyatskaya,et al.  Enabling trusted stores for android , 2013, CCS 2013.

[63]  Thomas W. Reps,et al.  Precise interprocedural dataflow analysis via graph reachability , 1995, POPL '95.

[64]  Jeremy Clark,et al.  Baton: certificate agility for android's decentralized signing infrastructure , 2014, WiSec '14.

[65]  Xiao Zhang,et al.  AFrame: isolating advertisements from mobile applications in Android , 2013, ACSAC.

[66]  Juha Karhunen,et al.  Efficient Detection of Zero-day Android Malware Using Normalized Bernoulli Naive Bayes , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[67]  Stephen Smalley,et al.  Security Enhanced (SE) Android: Bringing Flexible MAC to Android , 2013, NDSS.

[68]  Jaideep Chandrashekar,et al.  Taming the Android AppStore: Lightweight Characterization of Android Applications , 2015, ArXiv.

[69]  Tilo Müller,et al.  Dynamic Self-Protection and Tamperproofing for Android Apps Using Native Code , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[70]  Daniele Gallingani,et al.  Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications , 2015 .

[71]  Ulrike Meyer,et al.  Messing with Android's Permission Model , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[72]  John C. S. Lui,et al.  Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[73]  Yuval Elovici,et al.  Google Android: A State-of-the-Art Review of Security Mechanisms , 2009, ArXiv.

[74]  Wenke Lee,et al.  Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting , 2015, NDSS.

[75]  Olga Gadyatskaya,et al.  DEMO: Enabling trusted stores for android , 2013, CCS.

[76]  Ninghui Li,et al.  Using probabilistic generative models for ranking risks of Android apps , 2012, CCS.

[77]  Jacques Klein,et al.  A Forensic Analysis of Android Malware -- How is Malware Written and How it Could Be Detected? , 2014, 2014 IEEE 38th Annual Computer Software and Applications Conference.

[78]  Yajin Zhou,et al.  DIVILAR: diversifying intermediate language for anti-repackaging on android platform , 2014, CODASPY '14.

[79]  Dawn Xiaodong Song,et al.  Contextual Policy Enforcement in Android Applications with Permission Event Graphs , 2013, NDSS.

[80]  Vrizlynn L. L. Thing,et al.  Securing Android , 2015, ACM Comput. Surv..

[81]  Xuxian Jiang,et al.  Unsafe exposure analysis of mobile in-app advertisements , 2012, WISEC '12.

[82]  Felix C. Freiling,et al.  An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs , 2014, SecureComm.

[83]  Xingmin Cui,et al.  WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps , 2015, WISEC.

[84]  Vitor Monte Afonso,et al.  Identifying Android malware using dynamically obtained features , 2014, Journal of Computer Virology and Hacking Techniques.

[85]  Ahmad-Reza Sadeghi,et al.  XiOS: Extended Application Sandboxing on iOS , 2015, AsiaCCS.

[86]  Soon Ki Jung,et al.  Protecting Android applications with steganography-based software watermarking , 2013, SAC '13.

[87]  Xiapu Luo,et al.  On Tracking Information Flows through JNI in Android Applications , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[88]  Jeremy Clark,et al.  Understanding and improving app installation security mechanisms through empirical analysis of android , 2012, SPSM '12.

[89]  Alireza Sadeghi,et al.  Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities , 2014, FASE.

[90]  Ayumu Kubota,et al.  Kernel-based Behavior Analysis for Android Malware Detection , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[91]  Hao Chen,et al.  Attack of the Clones: Detecting Cloned Applications on Android Markets , 2012, ESORICS.

[92]  Somesh Jha,et al.  Retargeting Android applications to Java bytecode , 2012, SIGSOFT FSE.

[93]  Jacques Klein,et al.  I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis , 2014, ArXiv.

[94]  Xiangliang Zhang,et al.  Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection , 2014, IEEE Transactions on Information Forensics and Security.

[95]  Bruno Crispo,et al.  YAASE: Yet Another Android Security Extension , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[96]  Michael Backes,et al.  AppGuard - Enforcing User Requirements on Android Apps , 2013, TACAS.

[97]  Ali A. Ghorbani,et al.  Exploring reverse engineering symptoms in Android apps , 2015, EuroSec '15.

[98]  Florian Michahelles,et al.  Detection of Malicious Applications on Android OS , 2010, ICWF.

[99]  Lei Zhang,et al.  Attack Tree Based Android Malware Detection with Hybrid Analysis , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[100]  Eric Bodden,et al.  A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks , 2014, NDSS.

[101]  Peng Ning,et al.  EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning , 2015, USENIX Security Symposium.

[102]  Michael D. Ernst Invited Talk Static and dynamic analysis: synergy and duality , 2004, PASTE '04.

[103]  Mohd Faizal Abdollah,et al.  Profiling mobile malware behaviour through hybrid malware analysis approach , 2013, 2013 9th International Conference on Information Assurance and Security (IAS).

[104]  Dan Wang,et al.  ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[105]  Todd D. Millstein,et al.  Dr. Android and Mr. Hide: fine-grained permissions in android applications , 2012, SPSM '12.

[106]  Tom Martin,et al.  Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.

[107]  Atul Prakash,et al.  OASIS: Operational Access Sandboxes for Information Security , 2014, SPSM@CCS.

[108]  Benjamin Livshits,et al.  Reflection Analysis for Java , 2005, APLAS.

[109]  Juan E. Tapiador,et al.  Evolution, Detection and Analysis of Malware for Smart Devices , 2014, IEEE Communications Surveys & Tutorials.

[110]  Marcelo d'Amorim,et al.  Static Analysis of Implicit Control Flow: Resolving Java Reflection and Android Intents (T) , 2015, 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE).

[111]  Supratik Mukhopadhyay,et al.  Model-Based Static Source Code Analysis of Java Programs with Applications to Android Security , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.

[112]  Gianluca Dini,et al.  Probabilistic Contract Compliance for Mobile Applications , 2013, 2013 International Conference on Availability, Reliability and Security.

[113]  Sam Blackshear,et al.  Thresher: precise refutations for heap reachability , 2013, PLDI.

[114]  Mauro Conti,et al.  CRePE: Context-Related Policy Enforcement for Android , 2010, ISC.

[115]  Dennis G. Kafura,et al.  DroidBarrier: know what is executing on your android , 2014, CODASPY '14.

[116]  Mu Zhang,et al.  Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs , 2014, CCS.

[117]  Yajin Zhou,et al.  Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.

[118]  Prabir Bhattacharya,et al.  A hybrid approach for mobile security threat analysis , 2015, WISEC.

[119]  Ji Xiang,et al.  Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services , 2015, ACSAC.

[120]  Sam Malek,et al.  A Framework for Automated Security Testing of Android Applications on the Cloud , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability Companion.

[121]  Agostino Cortesi,et al.  Privacy Analysis of Android Apps: Implicit Flows and Quantitative Analysis , 2015, CISIM.

[122]  Irina Shklovski,et al.  Leakiness and creepiness in app space: perceptions of privacy and mobile app use , 2014, CHI.

[123]  Patrick D. McDaniel,et al.  Semantically Rich Application-Centric Security in Android , 2009, 2009 Annual Computer Security Applications Conference.

[124]  Lorrie Faith Cranor,et al.  A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.

[125]  Hybrid User-level Sandboxing of Third-party Android Apps , 2015, AsiaCCS.

[126]  Niu Yan,et al.  A3: Automatic Analysis of Android Malware , 2013, CloudCom 2013.

[127]  Lukasz Ziarek,et al.  Flow Permissions for Android , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).

[128]  Bernd Freisleben,et al.  Why eve and mallory love android: an analysis of android SSL (in)security , 2012, CCS.

[129]  Atul Prakash,et al.  Practical Always-on Taint Tracking on Mobile Devices , 2015, HotOS.

[130]  Paul C. van Oorschot,et al.  A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.

[131]  Vitaly Shmatikov,et al.  Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks , 2014, NDSS.

[132]  Kouichi Sakurai,et al.  A proposal for the privacy leakage verification tool for Android application developers , 2013, ICUIMC '13.

[133]  Yingjun Lyu,et al.  String analysis for Java and Android applications , 2015, ESEC/SIGSOFT FSE.

[134]  Ulrike Meyer,et al.  Fast Identification of Obfuscation and Mobile Advertising in Mobile Malware , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[135]  John C. S. Lui,et al.  DroidRay: a security evaluation system for customized android firmwares , 2014, AsiaCCS.

[136]  Xuxian Jiang,et al.  Design and implementation of an Android host-based intrusion prevention system , 2014, ACSAC.

[137]  Ahmad-Reza Sadeghi,et al.  Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies , 2013, USENIX Security Symposium.

[138]  Lujo Bauer,et al.  More than skin deep: measuring effects of the underlying model on access-control system usability , 2011, CHI.

[139]  Xuxian Jiang,et al.  AppInk: watermarking android apps for repackaging deterrence , 2013, ASIA CCS '13.

[140]  Yingjiu Li,et al.  Permission based Android security: Issues and countermeasures , 2014, Comput. Secur..

[141]  Mi-Jung Choi,et al.  Analysis of Android malware detection performance using machine learning classifiers , 2013, 2013 International Conference on ICT Convergence (ICTC).

[142]  Andrea Valdi,et al.  AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors , 2013, SPSM '13.

[143]  Stefano Paraboschi,et al.  SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases , 2015, ACSAC 2015.

[144]  Zhi Xu,et al.  SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones , 2015, CODASPY.

[145]  Wei Xu,et al.  Permlyzer: Analyzing permission usage in Android applications , 2013, 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE).

[146]  Alessandra Gorla,et al.  Mining Apps for Abnormal Usage of Sensitive Data , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.

[147]  Tao Zhang,et al.  AntiMalDroid: An Efficient SVM-Based Malware Detection Framework for Android , 2011, ICICA.

[148]  Edgar R. Weippl,et al.  Network Security Challenges in Android Applications , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[149]  Aruna Seneviratne,et al.  A measurement study of tracking in paid mobile applications , 2015, WISEC.

[150]  Gang Tan,et al.  NativeGuard: protecting android applications from third-party native libraries , 2014, WiSec '14.

[151]  Benjamin Livshits,et al.  Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications , 2013, USENIX Security Symposium.

[152]  Ahmad-Reza Sadeghi,et al.  Privilege Escalation Attacks on Android , 2010, ISC.

[153]  Franklin Tchakounté,et al.  System Calls Analysis of Malwares on Android , 2013 .

[154]  Kai Chen,et al.  Timing-Based Clone Detection on Android Markets , 2014, SecureComm.

[155]  Shashi Shekhar,et al.  QUIRE: Lightweight Provenance for Smart Phone Operating Systems , 2011, USENIX Security Symposium.

[156]  Angelos Stavrou,et al.  Analysis of Android Applications' Permissions , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability Companion.

[157]  Evangelos P. Markatos,et al.  The man who was there: validating check-ins in location-based services , 2013, ACSAC.

[158]  Songwu Lu,et al.  SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.

[159]  Vincent Roca,et al.  Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permission , 2014, WiSec '14.

[160]  Sencun Zhu,et al.  GroupTie: toward hidden collusion group discovery in app stores , 2014, WiSec '14.

[161]  Vivek Sarkar,et al.  Automatic detection of inter-application permission leaks in Android applications , 2013, IBM J. Res. Dev..

[162]  Valérie Viet Triem Tong,et al.  Capturing Android Malware Behaviour Using System Flow Graph , 2014, NSS.

[163]  Michael D. Ernst Static and dynamic analysis: synergy and duality , 2003 .

[164]  Stefano Zanero,et al.  HelDroid: Dissecting and Detecting Mobile Ransomware , 2015, RAID.

[165]  Gang Li,et al.  Contrasting Permission Patterns between Clean and Malicious Android Applications , 2013, SecureComm.

[166]  Hui Ye,et al.  DroidFuzzer: Fuzzing the Android Apps with Intent-Filter Tag , 2013, MoMM '13.

[167]  Christopher Krügel,et al.  EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework , 2015, NDSS.

[168]  Yuan Zhang,et al.  AppIntent: analyzing sensitive data transmission in android for privacy leakage detection , 2013, CCS.

[169]  Jacques Klein,et al.  FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.

[170]  Jean-Pierre Seifert,et al.  pBMDS: a behavior-based malware detection system for cellphone devices , 2010, WiSec '10.

[171]  SPSM'11, Proceedings of the 1st ACM Workshop Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2011, October 17, 2011, Chicago, IL, USA , 2011, SPSM@CCS.

[172]  Xi Xiao,et al.  Detecting Mobile Malware with TMSVM , 2014, SecureComm.

[173]  Lei Zhang,et al.  Hybrid Detection Using Permission Analysis for Android Malware , 2014, SecureComm.

[174]  Ahmad-Reza Sadeghi,et al.  XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks , 2011 .

[175]  Bing Wang,et al.  Manilyzer: Automated Android Malware Detection through Manifest Analysis , 2014, 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems.

[176]  Robert H. Deng,et al.  Active Semi-supervised Approach for Checking App Behavior against Its Description , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[177]  Wenliang Du,et al.  Compac: enforce component-level access control in android , 2014, CODASPY '14.

[178]  William Enck,et al.  AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY.

[179]  Xinwen Zhang,et al.  Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.

[180]  Hao Huang,et al.  Detect Android Malware Variants Using Component Based Topology Graph , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[181]  V. N. Sastry,et al.  STAMBA: Security Testing for Android Mobile Banking Apps , 2015, SIRS.

[182]  Yuan Zhang,et al.  FineDroid: Enforcing Permissions with System-Wide Application Execution Context , 2015, SecureComm.

[183]  Ryan Stevens,et al.  MAdFraud: investigating ad fraud in android applications , 2014, MobiSys.

[184]  Carol J. Fung,et al.  A Survey of Android Security Threats and Defenses , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[185]  David Brumley,et al.  An empirical study of cryptographic misuse in android applications , 2013, CCS.

[186]  Yang Wang,et al.  Quantitative Security Risk Assessment of Android Permissions and Applications , 2013, DBSec.

[187]  Lujo Bauer,et al.  Android taint flow analysis for app sets , 2014, SOAP '14.

[188]  You Joung Ham,et al.  Android Mobile Application System Call Event Pattern Analysis for Determination of Malicious Attack , 2014 .

[189]  Roksana Boreli,et al.  On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[190]  Mengyang Liu,et al.  MonkeyDroid: Detecting Unreasonable Privacy Leakages of Android Applications , 2015, ICONIP.

[191]  Ali A. Ghorbani,et al.  Android Botnets: What URLs are Telling Us , 2015, NSS.

[192]  Julia Rubin,et al.  A Bayesian Approach to Privacy Enforcement in Smartphones , 2014, USENIX Security Symposium.

[193]  Hubert Ritzdorf,et al.  Analysis of the communication between colluding applications on modern smartphones , 2012, ACSAC '12.

[194]  Latifur Khan,et al.  SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps , 2014, NDSS.

[195]  Steve Hanna,et al.  A survey of mobile malware in the wild , 2011, SPSM '11.

[196]  Lei Zhang,et al.  Towards a scalable resource-driven approach for detecting repackaged Android applications , 2014, ACSAC.

[197]  Konrad Rieck,et al.  Structural detection of android malware using embedded call graphs , 2013, AISec.

[198]  Sam Blackshear,et al.  Droidel: a general approach to Android framework modeling , 2015, SOAP@PLDI.

[199]  Hamed Haddadi,et al.  Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics , 2014, ArXiv.

[200]  Matthew Smith,et al.  Using personal examples to improve risk communication for security & privacy decisions , 2014, CHI.

[201]  William K. Robertson,et al.  VirtualSwindle: an automated attack against in-app billing on android , 2014, AsiaCCS.

[202]  Karim O. Elish,et al.  On the Need of Precise Inter-App ICC Classification for Detecting Android , 2015 .

[203]  Alexander Pretschner,et al.  Flexible Data-Driven Security for Android , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability.

[204]  Jacques Klein,et al.  ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis , 2015, SEC.

[205]  Tayssir Touili,et al.  Model-Checking for Android Malware Detection , 2014, APLAS.

[206]  Peng Wang,et al.  Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale , 2015, USENIX Security Symposium.

[207]  Wenjia Li,et al.  SVM-based malware detection for Android applications , 2015, WISEC.

[208]  Toshiaki Tanaka,et al.  A Small But Non-negligible Flaw in the Android Permission Scheme , 2010, 2010 IEEE International Symposium on Policies for Distributed Systems and Networks.

[209]  Hossain Shahriar,et al.  Content Provider Leakage Vulnerability Detection in Android Applications , 2014, SIN.

[210]  Sotiris Ioannidis,et al.  AndRadar: Fast Discovery of Android Applications in Alternative Markets , 2014, DIMVA.

[211]  Donggang Liu,et al.  DroidTest: Testing Android Applications for Leakage of Private Information , 2013, ISC.

[212]  Thorsten Holz,et al.  Mobile Malware Detection Based on Energy Fingerprints - A Dead End? , 2013, RAID.

[213]  Volker Stolz,et al.  How Useful Are Existing Monitoring Languages for Securing Android Apps? , 2013, Software Engineering.

[214]  Tao Wei,et al.  DroidLogger: Reveal suspicious behavior of Android applications via instrumentation , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).

[215]  J. Thangakumar,et al.  A cloud-based intrusion detection system for Android smartphones , 2012, 2012 International Conference on Radar, Communication and Computing (ICRCC).

[216]  Xiao Zhang,et al.  Attacks on Android Clipboard , 2014, DIMVA.

[217]  Wenke Lee,et al.  CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.

[218]  Sankardas Roy,et al.  Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps , 2014, CCS.

[219]  Zhi Wang,et al.  Systematic audit of third-party android phones , 2014, CODASPY '14.

[220]  Xiangyu Zhang,et al.  SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps , 2015, USENIX Security Symposium.

[221]  Pietro Ferrara,et al.  MorphDroid: Fine-grained Privacy Verification , 2015, ACSAC.

[222]  Philipp Stephanow,et al.  App-Ray: User-driven and fully automated Android app security assessment , 2013 .

[223]  Shivakant Mishra,et al.  Location based power analysis to detect malicious code in smartphones , 2011, SPSM '11.

[224]  Patrick D. McDaniel,et al.  On lightweight mobile phone application certification , 2009, CCS.

[225]  Hao Chen,et al.  I-ARM-Droid : A Rewriting Framework for In-App Reference Monitors for Android Applications , 2012 .

[226]  Matthew Might,et al.  Sound and precise malware analysis for android via pushdown reachability and entry-point saturation , 2013, SPSM '13.

[227]  Ana R. Cavalli,et al.  Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems , 2014, 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion.

[228]  Christian Jung,et al.  Context-Aware Policy Enforcement for Android , 2013, 2013 IEEE 7th International Conference on Software Security and Reliability.

[229]  Hui Liu,et al.  Vulnerability Assessment of OAuth Implementations in Android Applications , 2015, ACSAC 2015.

[230]  Jacques Klein,et al.  IccTA: Detecting Inter-Component Privacy Leaks in Android Apps , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.

[231]  Kang G. Shin,et al.  Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.

[232]  Yajin Zhou,et al.  Owner-Centric Protection of Unstructured Data on Smartphones , 2014, TRUST.

[233]  Xue Liu,et al.  Effective Real-Time Android Application Auditing , 2015, 2015 IEEE Symposium on Security and Privacy.

[234]  Michele Bugliesi,et al.  Lintent: Towards Security Type-Checking of Android Applications , 2013, FMOODS/FORTE.

[235]  L. Cavallaro,et al.  A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors , 2013 .

[236]  Giovanni Russello,et al.  FireDroid: hardening security in almost-stock Android , 2013, ACSAC.

[237]  Byung-Gon Chun,et al.  TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones , 2014, Commun. ACM.

[238]  Yen-Lin Chen,et al.  DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[239]  Chun-Ying Huang,et al.  Performance Evaluation on Permission-Based Detection for Android Malware , 2013 .

[240]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[241]  Guo Tao,et al.  Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications , 2014, DASC.

[242]  Sahin Albayrak,et al.  An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.

[243]  Joseph K. Liu,et al.  Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data , 2015, AsiaCCS.

[244]  Yuewu Wang,et al.  MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring , 2012, ICISC.

[245]  Kai Chen,et al.  Droidmarking: resilient software watermarking for impeding android application repackaging , 2014, ASE.

[246]  Isil Dillig,et al.  Apposcopy: semantics-based detection of Android malware through static analysis , 2014, SIGSOFT FSE.

[247]  Jacques Klein,et al.  Automatically Exploiting Potential Component Leaks in Android Applications , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[248]  Steve Hanna,et al.  Android permissions demystified , 2011, CCS '11.

[249]  Ramesh Govindan,et al.  SIF: a selective instrumentation framework for mobile applications , 2013, MobiSys '13.

[250]  Makoto Kato,et al.  A Dynamic Countermeasure Method to Android Malware by User Approval , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference.

[251]  Christian Bauckhage,et al.  Malware Detection on Mobile Devices Using Distributed Machine Learning , 2010, 2010 20th International Conference on Pattern Recognition.

[252]  M. Chuah,et al.  Smartphone Dual Defense Protection Framework: Detecting Malicious Applications in Android Markets , 2012, 2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).

[253]  Xiaodong Lin,et al.  Detecting GPS information leakage in Android applications , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[254]  Heng Yin,et al.  Attacks on WebView in the Android system , 2011, ACSAC '11.

[255]  Zheng Wei,et al.  LazyTainter: Memory-Efficient Taint Tracking in Managed Runtimes , 2014, SPSM@CCS.

[256]  Bongjae Kim,et al.  Enhancing security enforcement on unmodified Android , 2013, SAC '13.

[257]  Baber Aslam,et al.  Uncovering Self Code Modification in Android , 2015, C2SI.

[258]  Igor Nai Fovino,et al.  A Permission verification approach for android mobile applications , 2015, Comput. Secur..

[259]  Gerardo Canfora,et al.  Composition-Malware: Building Android Malware at Run Time , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[260]  Lubomir T. Chitkushev,et al.  DR BACA: dynamic role based access control for Android , 2013, ACSAC.

[261]  Angelos Stavrou,et al.  Behavioral Analysis of Android Applications Using Automated Instrumentation , 2013, 2013 IEEE Seventh International Conference on Software Security and Reliability Companion.

[262]  Jing Tao,et al.  MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).

[263]  Jean-Marc Robert,et al.  Smartphone malware detection: From a survey towards taxonomy , 2012, 2012 7th International Conference on Malicious and Unwanted Software.

[264]  Yulong Zhang,et al.  Towards Discovering and Understanding Task Hijacking in Android , 2015, USENIX Security Symposium.

[265]  Juanru Li,et al.  APKLancet: tumor payload diagnosis and purification for android applications , 2014, AsiaCCS.

[266]  Thomas Schreck,et al.  Mobile-sandbox: having a deeper look into android applications , 2013, SAC '13.

[267]  Herbert Bos,et al.  Dynamic Analysis of Android Malware , 2013 .

[268]  Yajin Zhou,et al.  Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.

[269]  Fan Yang,et al.  Detection of Android Malicious Apps Based on the Sensitive Behaviors , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[270]  Markus Zeilinger,et al.  ANANAS - A Framework for Analyzing Android Applications , 2013, 2013 International Conference on Availability, Reliability and Security.

[271]  Alireza Sadeghi,et al.  COVERT: Compositional Analysis of Android Inter-App Permission Leakage , 2015, IEEE Transactions on Software Engineering.

[272]  Edgar R. Weippl,et al.  Enter Sandbox: Android Sandbox Comparison , 2014, ArXiv.

[273]  Igor Santos,et al.  Anomaly Detection Using String Analysis for Android Malware Detection , 2013, SOCO-CISIS-ICEUTE.

[274]  Eric Bodden,et al.  How Current Android Malware Seeks to Evade Automated Code Analysis , 2015, WISTP.

[275]  Lorrie Faith Cranor,et al.  Privacy as part of the app decision-making process , 2013, CHI.

[276]  Stefano Zanero,et al.  PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications , 2014, ArXiv.

[277]  Sam Malek,et al.  Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification , 2015, FM.

[278]  David A. Wagner,et al.  Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.

[279]  Zhuoqing Morley Mao,et al.  AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users , 2013, CODASPY.

[280]  Ziming Zhao,et al.  Morpheus: automatically generating heuristics to detect Android emulators , 2014, ACSAC '14.

[281]  Ana R. Cavalli,et al.  Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses , 2012, CSS.

[282]  Hao Chen,et al.  AppCracker: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps * , 2014 .

[283]  Yuval Elovici,et al.  “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.

[284]  Jacques Klein,et al.  Dexpler: converting Android Dalvik bytecode to Jimple for static analysis with Soot , 2012, SOAP '12.

[285]  Shashi Shekhar,et al.  AdSplit: Separating Smartphone Advertising from Applications , 2012, USENIX Security Symposium.

[286]  Vijay Laxmi,et al.  DRACO: DRoid analyst combo an android malware analysis framework , 2015, SIN.

[287]  Jacques Klein,et al.  Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis , 2013 .

[288]  Ayman I. Kayssi,et al.  Android SMS Malware: Vulnerability and Mitigation , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[289]  Peng Liu,et al.  Achieving accuracy and scalability simultaneously in detecting application clones on Android markets , 2014, ICSE.

[290]  Zhemin Yang,et al.  LeakMiner: Detect Information Leakage on Android with Static Taint Analysis , 2012, 2012 Third World Congress on Software Engineering.

[291]  David A. Wagner,et al.  Bifocals: Analyzing WebView Vulnerabilities in Android Applications , 2013, WISA.

[292]  Yuan Tian,et al.  PrivateDroid: Private Browsing Mode for Android , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[293]  Hao Chen,et al.  RetroSkeleton: retrofitting android apps , 2013, MobiSys '13.

[294]  Radu State,et al.  RAMSES: Revealing Android Malware Through String Extraction and Selection , 2014, SecureComm.

[295]  Latifur Khan,et al.  A Machine Learning Approach to Android Malware Detection , 2012, 2012 European Intelligence and Security Informatics Conference.

[296]  Yajin Zhou,et al.  Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.

[297]  Kai Wang,et al.  Function Escalation Attack , 2014, SecureComm.

[298]  Ziming Zhao,et al.  Towards Automated Risk Assessment and Mitigation of Mobile Applications , 2015, IEEE Transactions on Dependable and Secure Computing.

[299]  Xingquan Zhu,et al.  Machine Learning for Android Malware Detection Using Permission and API Calls , 2013, 2013 IEEE 25th International Conference on Tools with Artificial Intelligence.

[300]  Cecilia Mascolo,et al.  Don't kill my ads!: balancing privacy in an ad-supported mobile application market , 2012, HotMobile '12.

[301]  Yang Zhang,et al.  Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[302]  Karsten Sohr,et al.  The Transitivity-of-Trust Problem in Android Application Interaction , 2013, 2013 International Conference on Availability, Reliability and Security.

[303]  Artem Starostin,et al.  A framework for static detection of privacy leaks in android applications , 2012, SAC '12.

[304]  Nicolas Christin,et al.  A5: Automated Analysis of Adversarial Android Applications , 2014, SPSM@CCS.

[305]  Helen J. Wang,et al.  User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems , 2012, 2012 IEEE Symposium on Security and Privacy.

[306]  Alessandra Gorla,et al.  Checking app behavior against app descriptions , 2014, ICSE.

[307]  Seong-je Cho,et al.  A kernel-based monitoring approach for analyzing malicious behavior on Android , 2014, SAC.

[308]  Xuxian Jiang,et al.  Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks , 2014, IEEE Transactions on Information Forensics and Security.

[309]  David A. Wagner,et al.  AdDroid: privilege separation for applications and advertisers in Android , 2012, ASIACCS '12.

[310]  Yuval Elovici,et al.  Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.

[311]  William K. Robertson,et al.  PatchDroid: scalable third-party security patches for Android devices , 2013, ACSAC.

[312]  Eliane Martins,et al.  A security configuration assessment for android devices , 2015, SAC.

[313]  Sven Bugiel,et al.  Scippa: system-centric IPC provenance on Android , 2014, ACSAC.

[314]  Dafang Zhang,et al.  Fest: A feature extraction and selection tool for Android malware detection , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[315]  Hongxia Jin,et al.  Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps , 2015, MobiSys.

[316]  Nan Zhang,et al.  The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations , 2014, 2014 IEEE Symposium on Security and Privacy.

[317]  Angelos Stavrou,et al.  Targeted DoS on android: how to disable android in 10 seconds or less , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).

[318]  Lukasz Ziarek,et al.  Information flows as a permission mechanism , 2014, ASE.

[319]  Sencun Zhu,et al.  ViewDroid: towards obfuscation-resilient mobile application repackaging detection , 2014, WiSec '14.

[320]  Zhenkai Liang,et al.  AirBag: Boosting Smartphone Resistance to Malware Infection , 2014, NDSS.

[321]  Peng Wang,et al.  AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction , 2014, ICSE.

[322]  XiaoFeng Wang,et al.  Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating , 2014, 2014 IEEE Symposium on Security and Privacy.

[323]  Yung Ryn Choe,et al.  Andlantis: Large-scale Android Dynamic Analysis , 2014, ArXiv.

[324]  Xiaohong Su,et al.  A Framework for Understanding Dynamic Anti-Analysis Defenses , 2014, PPREW-4.

[325]  Jeff H. Perkins,et al.  Information Flow Analysis of Android Applications in DroidSafe , 2015, NDSS.

[326]  Alastair R. Beresford,et al.  MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.

[327]  Sencun Zhu,et al.  AppWatcher: unveiling the underground market of trading mobile app reviews , 2015, WISEC.

[328]  Mu Zhang,et al.  Efficient, context-aware privacy leakage confinement for android applications without firmware modding , 2014, AsiaCCS.

[329]  Yajin Zhou,et al.  Fast, scalable detection of "Piggybacked" mobile applications , 2013, CODASPY.

[330]  Feng Li,et al.  Android Smartphone Third Party Advertising Library Data Leak Analysis , 2014, 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems.

[331]  Alessandro Armando,et al.  Formal Modeling and Reasoning about the Android Security Framework , 2012, TGC.

[332]  Meikang Qiu,et al.  Context Awareness through Reasoning on Private Analysis for Android Application , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[333]  Simin Nadjm-Tehrani,et al.  Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.

[334]  J. Foster,et al.  SCanDroid: Automated Security Certification of Android , 2009 .

[335]  Yajin Zhou,et al.  The impact of vendor customizations on android security , 2013, CCS.

[336]  Vijay Laxmi,et al.  AndroSimilar: robust statistical feature signature for Android malware detection , 2013, SIN.

[337]  Kun Yang,et al.  IntentFuzzer: detecting capability leaks of android applications , 2014, AsiaCCS.

[338]  Olawale Surajudeen Adebayo,et al.  Android malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization , 2014, 2014 4th World Congress on Information and Communication Technologies (WICT 2014).

[339]  Ahmad-Reza Sadeghi,et al.  ASM: A Programmable Interface for Extending Android Security , 2014, USENIX Security Symposium.

[340]  Swarat Chaudhuri,et al.  A Study of Android Application Security , 2011, USENIX Security Symposium.

[341]  Qi Li,et al.  Android Malware Detection Based on Static Analysis of Characteristic Tree , 2015, 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[342]  Henrique Kawakami,et al.  Security and system architecture: comparison of Android customizations , 2015, WISEC.

[343]  Heng Yin,et al.  DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.

[344]  Hao Chen,et al.  AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale , 2012, TRUST.

[345]  Joachim Posegga,et al.  Constroid: data-centric access control for android , 2012, SAC '12.

[346]  Seung-Hun Jin,et al.  Warning System for Detecting Malicious Applications on Android System , 2013 .

[347]  Zhenkai Liang,et al.  A Light-Weight Software Environment for Confining Android Malware , 2014, 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion.

[348]  Konrad Rieck,et al.  DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.

[349]  Gökhan Bal Revealing Privacy-Impacting Behavior Patterns of Smartphone Applications , 2012 .

[350]  Gordon Russell,et al.  Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System , 2015, HCI.

[351]  Yan Chen,et al.  Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android , 2015, SecureComm.

[352]  Igor Santos,et al.  Instance-based anomaly method for Android malware detection , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[353]  Julian Schütte,et al.  Apparecium: Revealing Data Flows in Android Applications , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.

[354]  James C. King,et al.  Symbolic execution and program testing , 1976, CACM.

[355]  Tilo Müller,et al.  Divide-and-Conquer: Why Android Malware Cannot Be Stopped , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.

[356]  Emiliano De Cristofaro,et al.  Danger is my middle name: experimenting with SSL vulnerabilities in Android apps , 2015, WISEC.

[357]  Byung-Gon Chun,et al.  TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.

[358]  Ziming Zhao,et al.  RiskMon: continuous and automated risk assessment of mobile applications , 2014, CODASPY '14.

[359]  Sencun Zhu,et al.  A Framework for Evaluating Mobile App Repackaging Detection Algorithms , 2013, TRUST.

[360]  Jing Hu,et al.  POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware , 2015, SecureComm.

[361]  Yuan-Cheng Lai,et al.  Identifying android malicious repackaged applications by thread-grained system call sequences , 2013, Comput. Secur..

[362]  Tao Xie,et al.  AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.

[363]  Christian Platzer,et al.  MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[364]  Gerardo Canfora,et al.  A Classifier of Malicious Android Applications , 2013, 2013 International Conference on Availability, Reliability and Security.

[365]  Frank Swiderski,et al.  Threat Modeling , 2018, Hacking Connected Cars.

[366]  Kouichi Sakurai,et al.  Detection of Android API Call Using Logging Mechanism within Android Framework , 2013, SecureComm.

[367]  Yuval Elovici,et al.  Automated Static Code Analysis for Classifying Android Applications Using Machine Learning , 2010, 2010 International Conference on Computational Intelligence and Security.

[368]  Julian Schütte,et al.  ConDroid: Targeted Dynamic Analysis of Android Applications , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.

[369]  P. Vinod,et al.  Hartley's test ranked opcodes for Android malware analysis , 2015, SIN.

[370]  Bing Mao,et al.  DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware , 2013, ASIA CCS '13.

[371]  C. Kruegel,et al.  A Large-Scale Study of Mobile Web App Security , 2015 .

[372]  Steffen Wendzel,et al.  Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels , 2013, 2013 International Conference on Availability, Reliability and Security.

[373]  Eric Bodden,et al.  Instrumenting Android and Java Applications as Easy as abc , 2013, RV.

[374]  Patrick Traynor,et al.  MAST: triage for market-scale mobile malware analysis , 2013, WiSec '13.

[375]  Zhong Chen,et al.  AutoCog: Measuring the Description-to-permission Fidelity in Android Applications , 2014, CCS.

[376]  Wei Wang,et al.  Static Detection of Dangerous Behaviors in Android Apps , 2013, CSS.

[377]  Hahn-Ming Lee,et al.  DroidMat: Android Malware Detection through Manifest and API Calls Tracing , 2012, 2012 Seventh Asia Joint Conference on Information Security.

[378]  Michael Backes,et al.  Boxify: Full-fledged App Sandboxing for Stock Android , 2015, USENIX Security Symposium.

[379]  Nicolas Christin,et al.  Evading android runtime analysis via sandbox detection , 2014, AsiaCCS.

[380]  Radu Vanciu,et al.  Finding architectural flaws using constraints , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).

[381]  Lin Yan,et al.  SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications , 2015, SecureComm.

[382]  Heejo Lee,et al.  MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android , 2014, 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE).

[383]  Christopher Krügel,et al.  Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications , 2015, ACSAC.

[384]  Hai Huang,et al.  Kernel Data Attack Is a Realistic Security Threat , 2015, SecureComm.

[385]  Johannes Köstler,et al.  Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for Android , 2013, Inf. Secur. Tech. Rep..

[386]  Pearl Brereton,et al.  Lessons from applying the systematic literature review process within the software engineering domain , 2007, J. Syst. Softw..

[387]  Qiaoyan Wen,et al.  Intrusion detection model based on Android , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.

[388]  Anthony Desnos,et al.  Android: Static Analysis Using Similarity Distance , 2012, 2012 45th Hawaii International Conference on System Sciences.

[389]  Peng Liu,et al.  Duet: library integrity verification for android applications , 2014, WiSec '14.

[390]  K. Yi,et al.  Static Analyzer for Detecting Privacy Leaks in Android Applications , 2012 .

[391]  Steffen Lortz,et al.  Cassandra: Towards a Certifying App Store for Android , 2014, SPSM@CCS.

[392]  Toshihiro Yamauchi,et al.  DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android , 2014, J. Internet Serv. Inf. Secur..

[393]  Golden G. Richard,et al.  OpSeq: Android Malware Fingerprinting , 2015, PPREW@ACSAC.

[394]  Mauro Conti,et al.  MOSES: Supporting and Enforcing Security Profiles on Smartphones , 2014, IEEE Transactions on Dependable and Secure Computing.

[395]  Alfred V. Aho,et al.  Android Malware Static Analysis Techniques , 2015, CISR.

[396]  Jonathon T. Giffin,et al.  Automated remote repair for mobile malware , 2011, ACSAC '11.

[397]  Julian Schütte,et al.  An antivirus API for Android malware recognition , 2013, 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE).

[398]  Alireza Sadeghi,et al.  Practical, Formal Synthesis and Automatic Enforcement of Security Policies for Android , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[399]  W. Ford,et al.  Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption , 2000 .

[400]  Siu-Ming Yiu,et al.  DroidChecker: analyzing android applications for capability leak , 2012, WISEC '12.

[401]  Fernando C. Colón Osorio,et al.  “TrustDroid™”: Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking , 2012, 2012 7th International Conference on Malicious and Unwanted Software.

[402]  Yves Le Traon,et al.  Automatically securing permission-based software by reducing the attack surface: an application to Android , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.

[403]  Bin Liu,et al.  Investigating Effects of Control and Ads Awareness on Android Users' Privacy Behaviors and Perceptions , 2015, MobileHCI.

[404]  Herbert Bos,et al.  Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.

[405]  Huan Luo,et al.  Which Android App Store Can Be Trusted in China? , 2014, 2014 IEEE 38th Annual Computer Software and Applications Conference.

[406]  Xin Sun,et al.  Detection, Classification and Characterization of Android Malware Using API Data Dependency , 2015, SecureComm.

[407]  Mu Zhang,et al.  Towards Automatic Generation of Security-Centric Descriptions for Android Apps , 2015, CCS.

[408]  Sébastien Salva,et al.  Data vulnerability detection by security testing for Android applications , 2013, 2013 Information Security for South Africa.

[409]  Hao Chen,et al.  Investigating User Privacy in Android Ad Libraries , 2012 .

[410]  Suman Nath,et al.  PUMA: programmable UI-automation for large-scale dynamic analysis of mobile apps , 2014, MobiSys.

[411]  Yajin Zhou,et al.  Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.

[412]  Nikolai Tillmann,et al.  User-aware privacy control via extended static-information-flow analysis , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.

[413]  Bin Ma How We Found These Vulnerabilities in Android Applications , 2014, SecureComm.

[414]  Angelos Stavrou,et al.  Activity Spoofing and Its Defense in Android Smartphones , 2014, ACNS.

[415]  Alireza Sadeghi,et al.  Analysis of Android Inter-App Security Vulnerabilities Using COVERT , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.

[416]  Jun Yan,et al.  Characterizing and detecting resource leaks in Android applications , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).

[417]  Eric Bodden,et al.  DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.

[418]  Heng Yin,et al.  DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.

[419]  Shanqing Guo,et al.  PaddyFrog: systematically detecting confused deputy vulnerability in Android applications , 2015, Secur. Commun. Networks.

[420]  William Enck,et al.  Defending Users against Smartphone Apps: Techniques and Future Directions , 2011, ICISS.

[421]  Elisa Bertino,et al.  Context-Based Access Control Systems for Mobile Devices , 2015, IEEE Transactions on Dependable and Secure Computing.

[422]  Matteo Maffei,et al.  HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[423]  Xin Sun,et al.  Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph , 2014, SEC.

[424]  Christopher Krügel,et al.  PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.

[425]  Gianluca Dini,et al.  MADAM: A Multi-level Anomaly Detector for Android Malware , 2012, MMM-ACNS.

[426]  Arun Lakhotia,et al.  DroidLegacy: Automated Familial Classification of Android Malware , 2014, PPREW'14.

[427]  Steve Hanna,et al.  Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications , 2012, DIMVA.

[428]  Alessandro Coglio,et al.  Android Platform Modeling and Android App Verification in the ACL2 Theorem Prover , 2015, VSTTE.

[429]  Yajin Zhou,et al.  Detecting repackaged smartphone applications in third-party android marketplaces , 2012, CODASPY '12.

[430]  Veelasha Moonsamy,et al.  Mining permission patterns for contrasting clean and malicious android applications , 2014, Future Gener. Comput. Syst..

[431]  Anthony Desnos Android: From Reversing to Decompilation , 2011 .

[432]  Helen J. Wang,et al.  Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.

[433]  Ali A. Ghorbani,et al.  DroidKin: Lightweight Detection of Android Apps Similarity , 2014, SecureComm.

[434]  Matthew L. Dering,et al.  Composite Constant Propagation: Application to Android Inter-Component Communication Analysis , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.

[435]  Zhen Huang,et al.  PScout: analyzing the Android permission specification , 2012, CCS.

[436]  Jean-François Lalande,et al.  Repackaging Android Applications for Auditing Access to Private Data , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[437]  Lujo Bauer,et al.  Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract) , 2013, ESORICS.

[438]  Xiaofeng Wang,et al.  UIPicker: User-Input Privacy Identification in Mobile Applications , 2015, USENIX Security Symposium.

[439]  Christopher Krügel,et al.  What the App is That? Deception and Countermeasures in the Android User Interface , 2015, 2015 IEEE Symposium on Security and Privacy.

[440]  Avik Chaudhuri,et al.  Language-based security on Android , 2009, PLAS '09.

[441]  Silva Filho,et al.  Static analysis of implicit control flow: resolving Java reflection and Android intents , 2016 .

[442]  S. Malek,et al.  Automated Dynamic Enforcement of Synthesized Security Policies in Android , 2015 .

[443]  Laurie Hendren,et al.  Soot: a Java bytecode optimization framework , 2010, CASCON.

[444]  Julian Schütte,et al.  AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[445]  Vincent Roca,et al.  Detecting privacy leaks in the RATP App: how we proceeded and what we found , 2013, Journal of Computer Virology and Hacking Techniques.

[446]  Dengguo Feng,et al.  A Rapid and Scalable Method for Android Application Repackaging Detection , 2015, ISPEC.

[447]  Sahin Albayrak,et al.  Detecting Symbian OS malware through static function call analysis , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).

[448]  Matthias Lange,et al.  L4Android: a generic operating system framework for secure smartphones , 2011, SPSM '11.

[449]  Edgar R. Weippl,et al.  Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications , 2012, NDSS.

[450]  Hui Xiong,et al.  Mobile app recommendations with security and privacy awareness , 2014, KDD.

[451]  Zhuoqing Morley Mao,et al.  Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks , 2014, USENIX Security Symposium.

[452]  Barbara Kitchenham,et al.  Procedures for Performing Systematic Reviews , 2004 .

[453]  Seungyeop Han,et al.  These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.

[454]  Michael S. Hsiao,et al.  Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[455]  Michael D. Ernst,et al.  Collaborative Verification of Information Flow for a High-Assurance App Store , 2014, Software Engineering & Management.

[456]  Hao Huang,et al.  Defensor: Lightweight and Efficient Security-Enhanced Framework for Android , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[457]  Kai Wang,et al.  IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication , 2015, ISPEC.

[458]  Guofei Gu,et al.  SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications , 2012, SPSM '12.

[459]  Jacques Klein,et al.  Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges and Solutions for Analyzing Android , 2014, IEEE Transactions on Software Engineering.

[460]  Yan Wang,et al.  Static Control-Flow Analysis of User-Driven Callbacks in Android Applications , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.

[461]  Wei Wang,et al.  Discovery of emergent malicious campaigns in cellular networks , 2013, ACSAC.

[462]  Ninghui Li,et al.  Effective Risk Communication for Android Apps , 2013, IEEE Transactions on Dependable and Secure Computing.

[463]  Kim-Kwang Raymond Choo,et al.  Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[464]  Jacques Klein,et al.  Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis , 2013, USENIX Security Symposium.

[465]  Luo Si,et al.  A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code , 2015, IEEE Transactions on Dependable and Secure Computing.

[466]  Ainuddin Wahid Abdul Wahab,et al.  A review on feature selection in mobile malware detection , 2015, Digit. Investig..

[467]  Hai Jin,et al.  CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers , 2015, WISEC.

[468]  Kai Chen,et al.  Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android , 2015, AsiaCCS.

[469]  Eric Bodden,et al.  DroidSearch: A tool for scaling Android app triage to real-world app stores , 2015, 2015 Science and Information Conference (SAI).

[470]  Nan Zhang,et al.  Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android , 2015, 2015 IEEE Symposium on Security and Privacy.

[471]  Yajin Zhou,et al.  Harvesting developer credentials in Android apps , 2015, WISEC.

[472]  Shouhuai Xu,et al.  Real-time detection and prevention of android SMS permission abuses , 2013, SESP '13.

[473]  Jules White,et al.  Applying machine learning classifiers to dynamic Android malware detection at scale , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[474]  Christopher Krügel,et al.  BareDroid: Large-Scale Analysis of Android Apps on Real Devices , 2015, ACSAC 2015.

[475]  Gonzalo Álvarez,et al.  PUMA: Permission Usage to Detect Malware in Android , 2012, CISIS/ICEUTE/SOCO Special Sessions.

[476]  Chia-Mei Chen,et al.  Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code , 2014, 2014 International Conference on Trustworthy Systems and their Applications.

[477]  Shih-Hao Hung,et al.  DroidDolphin: a dynamic Android malware detection framework using big data and machine learning , 2014, RACS '14.

[478]  Sunita V. Dhavale,et al.  Two Phase Static Analysis Technique for Android Malware Detection , 2015, WCI '15.

[479]  Byung-Gon Chun,et al.  Vision: automated security validation of mobile apps at app markets , 2011, MCS '11.

[480]  Kai Chen,et al.  From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App , 2015, CCS.

[481]  Xuxian Jiang,et al.  DroidChameleon: evaluating Android anti-malware against transformation attacks , 2013, ASIA CCS '13.

[482]  Valérie Viet Triem Tong,et al.  GroddDroid: a gorilla for triggering malicious behaviors , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).

[483]  Aristide Fattori,et al.  CopperDroid: Automatic Reconstruction of Android Malware Behaviors , 2015, NDSS.

[484]  Ahmad-Reza Sadeghi,et al.  PSiOS: bring your own privacy & security to iOS devices , 2013, ASIA CCS '13.

[485]  Christopher Krügel,et al.  On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users , 2015, DIMVA.

[486]  Juan E. Tapiador,et al.  Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families , 2014, Expert Syst. Appl..

[487]  Elisa Bertino,et al.  Detecting mobile malware threats to homeland security through static analysis , 2014, J. Netw. Comput. Appl..

[488]  Ahmad-Reza Sadeghi,et al.  Practical and lightweight domain isolation on Android , 2011, SPSM '11.

[489]  Thorsten Holz,et al.  Slicing droids: program slicing for smali code , 2013, SAC '13.

[490]  David A. Wagner,et al.  Reducing attack surfaces for intra-application communication in android , 2012, SPSM '12.

[491]  Julian Schütte,et al.  Native code execution control for attack mitigation on android , 2013, SPSM '13.

[492]  Mike Burmester Information security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010 : revised selected papers , 2011 .

[493]  Yu Yang,et al.  Automated Detection and Analysis for Android Ransomware , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[494]  Michael Backes,et al.  Android security framework: extensible multi-layered access control on Android , 2014, ACSAC '14.

[495]  Seungwon Shin,et al.  POSTER: A Collaborative Approach on Behavior-Based Android Malware Detection , 2015, SecureComm.

[496]  Miroslaw Malek,et al.  A Resource-Optimized Approach to Efficient Early Detection of Mobile Malware , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.

[497]  Nicolas Christin,et al.  Sweetening android lemon markets: measuring and combating malware in application marketplaces , 2013, CODASPY '13.

[498]  Nikolai Tillmann,et al.  User-aware privacy control via extended static-information-flow analysis , 2012, ASE.

[499]  Mu Zhang,et al.  AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications , 2014, NDSS.

[500]  Sam Malek,et al.  A whitebox approach for automated security testing of Android applications on the cloud , 2012, 2012 7th International Workshop on Automation of Software Test (AST).

[501]  Yanick Fratantonio,et al.  ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors , 2014, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

[502]  Michalis Faloutsos,et al.  ProfileDroid: multi-layer profiling of android applications , 2012, Mobicom '12.

[503]  Yuqiong Sun,et al.  AuDroid: Preventing Attacks on Audio Channels in Mobile Devices , 2015, ACSAC.

[504]  Sahin Albayrak,et al.  Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications , 2011, 2011 6th International Conference on Malicious and Unwanted Software.

[505]  David A. Wagner,et al.  Analyzing inter-application communication in Android , 2011, MobiSys '11.

[506]  David A. Wagner,et al.  How to Ask for Permission , 2012, HotSec.

[507]  Wei You,et al.  Android Implicit Information Flow Demystified , 2015, AsiaCCS.