Detect Sensitive Data Leakage via Inter-application on Android by Using Static Analysis and Dynamic Analysis
暂无分享,去创建一个
[1] John Regehr,et al. Intent fuzzer: crafting intents of death , 2014, WODA+PERTEA 2014.
[2] Mayur Naik,et al. Dynodroid: an input generation system for Android apps , 2013, ESEC/FSE 2013.
[3] Tuan Nguyen,et al. Android Security Analysis Based on Inter-application Relationships , 2016 .
[4] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[5] Lujo Bauer,et al. Android taint flow analysis for app sets , 2014, SOAP '14.
[6] Jacques Klein,et al. ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis , 2015, SEC.
[7] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[8] Avik Chaudhuri,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[9] Jacques Klein,et al. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[10] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[11] Iulian Neamtiu,et al. Targeted and depth-first exploration for systematic testing of android apps , 2013, OOPSLA.
[12] Eric Bodden,et al. A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks , 2014, NDSS.
[13] Guofei Gu,et al. SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications , 2012, SPSM '12.