Related references
Note: Only part of the references are listed.Deep Learning for Android Malware Defenses: A Systematic Literature Review
Yue Liu et al.
ACM COMPUTING SURVEYS (2023)
POSTER: Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning
Janaka Senanayake et al.
ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2022)
Android security assessment: A review, taxonomy and research gap study
Shivi Garg et al.
COMPUTERS & SECURITY (2021)
Automatic Malicious Code Classification System through Static Analysis Using Machine Learning
Sungjoong Kim et al.
SYMMETRY-BASEL (2021)
Understanding the Evolution of Android App Vulnerabilities
Jun Gao et al.
IEEE TRANSACTIONS ON RELIABILITY (2021)
The PRISMA 2020 statement: an updated guideline for reporting systematic reviews
Matthew J. Page et al.
BMJ-BRITISH MEDICAL JOURNAL (2021)
The Android Platform Security Model
Rene Mayrhofer et al.
ACM TRANSACTIONS ON PRIVACY AND SECURITY (2021)
Comparative analysis of Android and iOS from security viewpoint
Shivi Garg et al.
COMPUTER SCIENCE REVIEW (2021)
Vulnerabilities in Android webview objects: Still not the end!
Mohamed A. El-Zawawy et al.
COMPUTERS & SECURITY (2021)
Android Mobile Malware Detection Using Machine Learning: A Systematic Review
Janaka Senanayake et al.
ELECTRONICS (2021)
SO{U}RCERER : Developer-Driven Security Testing Framework for Android Apps
Muhammad Sajidur Rahman et al.
2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2021) (2021)
ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications
Xian Zhan et al.
2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021) (2021)
A Comprehensive Survey on Machine Learning Techniques for Android Malware Detection
Vasileios Kouliaridis et al.
INFORMATION (2021)
Extracting rules for vulnerabilities detection with static metrics using machine learning
Aakanshi Gupta et al.
INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT (2021)
Are free Android app security analysis tools effective in detecting known vulnerabilities?
Venkatesh-Prasad Ranganath et al.
EMPIRICAL SOFTWARE ENGINEERING (2020)
Interventions for long-term software security creating a lightweight program of assurance techniques for developers
Charles Weir et al.
SOFTWARE-PRACTICE & EXPERIENCE (2020)
Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis
Yingjie Wang et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2020)
A Novel Hybrid Method to Analyze Security Vulnerabilities in Android Applications
Junwei Tang et al.
TSINGHUA SCIENCE AND TECHNOLOGY (2020)
A TAN based hybrid model for android malware detection
Roopak Surendran et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)
Enforcing Green Code With Android Lint
Olivier Le Goaer
2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2020) (2020)
Ex-vivo dynamic analysis framework for Android device drivers
Ivan Pustogarov et al.
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) (2020)
Effectiveness of Kotlin vs. Java in android app development tasks
Luca Ardito et al.
INFORMATION AND SOFTWARE TECHNOLOGY (2020)
Vulnerability Prediction From Source Code Using Machine Learning
Zeki Bilgin et al.
IEEE ACCESS (2020)
Vulnerability Detection on Android Apps-Inspired by Case Study on Vulnerability Related With Web Functions
Jiawei Qin et al.
IEEE ACCESS (2020)
A Review of Android Malware Detection Approaches Based on Machine Learning
Kaijun Liu et al.
IEEE ACCESS (2020)
Automated Testing of Android Apps: A Systematic Literature Review
Pingfan Kong et al.
IEEE TRANSACTIONS ON RELIABILITY (2019)
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
Lucky Onwuzurike et al.
ACM TRANSACTIONS ON PRIVACY AND SECURITY (2019)
A novel parallel classifier scheme for vulnerability detection in Android
Shivi Garg et al.
COMPUTERS & ELECTRICAL ENGINEERING (2019)
AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach
Amr Amin et al.
INFORMATION (2019)
A Survey on Android Malware Detection Techniques Using Machine Learning Algorithms
Ebtesam J. Alqahtani et al.
2019 SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS) (2019)
Overview of machine learning methods for Android malware identification
Joao Lopes et al.
2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS) (2019)
Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis
Carlos Renato Salim Campos et al.
2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019) (2019)
ReCDroid: Automatically Reproducing Android Application Crashes from Bug Reports
Yu Zhao et al.
2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019) (2019)
A Systematic Review on Code Clone Detection
Qurat Ul Ain et al.
IEEE ACCESS (2019)
A formal approach for detection of security flaws in the android permission system
Hamid Bagheri et al.
FORMAL ASPECTS OF COMPUTING (2018)
Significant Permission Identification for Machine-Learning-Based Android Malware Detection
Jin Li et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews
Claudio Rizzo et al.
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018 (2018)
Automated Vulnerability Detection in Source Code Using Deep Representation Learning
Rebecca L. Russell et al.
2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA) (2018)
Machine Learning Methods for Software Vulnerability Detection
Boris Chernis et al.
IWSPA '18: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (2018)
AnFlo: Detecting Anomalous Sensitive Information Flows in Android Apps
Biniam Fisseha Demissie et al.
2018 IEEE/ACM 5TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT) (2018)
Network-based detection of Android malicious apps
Shree Garg et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2017)
Static analysis of android apps: A systematic literature review
Li Li et al.
INFORMATION AND SOFTWARE TECHNOLOGY (2017)
Characterizing malicious Android apps by mining topic-specific data flow signatures
Xinli Yang et al.
INFORMATION AND SOFTWARE TECHNOLOGY (2017)
Towards a threat assessment framework for apps collusion
Harsha Kumara Kalutarage et al.
TELECOMMUNICATION SYSTEMS (2017)
An Android Vulnerability Detection System
Jiayuan Zhang et al.
NETWORK AND SYSTEM SECURITY (2017)
A Stitch in Time: Supporting Android Developers in Writing Secure Code
Duc Cuong Nguyen et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
An Empirical Study on Android-related Vulnerabilities
Mario Linares-Vasquez et al.
2017 IEEE/ACM 14TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2017) (2017)
Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey
Seyed Mohammad Ghaffarian et al.
ACM COMPUTING SURVEYS (2017)
OASIS: Prioritizing Static Analysis Warnings for Android Apps Based on App User Reviews
Lili Wei et al.
ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING (2017)
Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications
Amiangshu Bosu et al.
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17) (2017)
A Comparison of Features for Android Malware Detection
Matthew Leeds et al.
PROCEEDINGS OF THE SOUTHEAST CONFERENCE ACM SE'17 (2017)
Toward Large-Scale Vulnerability Discovery using Machine Learning
Gustavo Grieco et al.
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (2016)
AndroZoo: Collecting Millions of Android Apps for the Research Community
Kevin Allix et al.
13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016) (2016)
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving
Stefano Calzavara et al.
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (2016)
COVERT: Compositional Analysis of Android Inter-App Permission Leakage
Hamid Bagheri et al.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2015)