What did Really Change with the New Release of the App?
暂无分享,去创建一个
Alessandra Gorla | Konstantin Kuznetsov | Xue Bai | Paolo Calciati | Alessandra Gorla | Konstantin Kuznetsov | Xue-Wei Bai | Paolo Calciati
[1] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[2] Alessandra Gorla,et al. How Do Apps Evolve in Their Permission Requests? A Preliminary Study , 2017, 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR).
[3] Alessandra Gorla,et al. Checking app behavior against app descriptions , 2014, ICSE.
[4] Matthew L. Dering,et al. Composite Constant Propagation: Application to Android Inter-Component Communication Analysis , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[5] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[6] Jacques Klein,et al. AndroZoo: Collecting Millions of Android Apps for the Research Community , 2016, 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR).
[7] Jeff H. Perkins,et al. Information Flow Analysis of Android Applications in DroidSafe , 2015, NDSS.
[8] Erik Derr,et al. Reliable Third-Party Library Detection in Android and its Security Applications , 2016, CCS.
[9] Alessandra Gorla,et al. CALAPPA: a toolchain for mining Android applications , 2016, WAMA@SIGSOFT FSE.
[10] Alessandra Gorla,et al. Automated Test Input Generation for Android: Are We There Yet? (E) , 2015, 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[11] Romain Rouvoy,et al. Tracking the Software Quality of Android Applications Along Their Evolution (T) , 2015, 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[12] Dan S. Wallach,et al. Longitudinal Analysis of Android Ad Library Permissions , 2013, ArXiv.
[13] Ivan Martinovic,et al. To Update or Not to Update: Insights From a Two-Year Study of Android App Evolution , 2017, AsiaCCS.
[14] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[15] Laurie Hendren,et al. Soot: a Java bytecode optimization framework , 2010, CASCON.
[16] Erik Derr,et al. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis , 2016, USENIX Security Symposium.
[17] Jian Liu,et al. LibD: Scalable and Precise Third-Party Library Detection in Android Markets , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE).
[18] Huan Luo,et al. Which Android App Store Can Be Trusted in China? , 2014, 2014 IEEE 38th Annual Computer Software and Applications Conference.
[19] Denis Bogdanas. DPerm: Assisting the Migration of Android Apps to Runtime Permissions , 2017, ArXiv.
[20] Jack Zhang,et al. The evolution of mobile apps: an exploratory study , 2013, DeMobile 2013.
[21] Premkumar T. Devanbu,et al. Asking for (and about) permissions used by Android apps , 2013, 2013 10th Working Conference on Mining Software Repositories (MSR).
[22] Jared Smith,et al. A Dataset of Open-Source Android Applications , 2015, 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories.
[23] Erik Derr,et al. Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android , 2017, CCS.
[24] Haoyu Wang,et al. LibRadar: Fast and Accurate Detection of Third-Party Libraries in Android Apps , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C).
[25] Gabriele Bavota,et al. ARENA: An Approach for the Automated Generation of Release Notes , 2017, IEEE Transactions on Software Engineering.
[26] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[27] Ondrej Lhoták,et al. Who You Gonna Call? Analyzing Web Requests in Android Applications , 2017, 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR).
[28] Narseo Vallina-Rodriguez,et al. Bug Fixes, Improvements,... and Privacy Leaks , 2018 .
[29] Jacques Klein,et al. Empirical assessment of machine learning-based malware detectors for Android , 2014, Empirical Software Engineering.
[30] Michalis Faloutsos,et al. Permission evolution in the Android ecosystem , 2012, ACSAC '12.