Related references
Note: Only part of the references are listed.Toward a Framework for Detecting Privacy Policy Violations in Android Application Code
Rocky Slavin et al.
2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE) (2016)
Making k-Object-Sensitive Pointer Analysis More Precise with Still k-Limiting
Tian Tan et al.
STATIC ANALYSIS, (SAS 2016) (2016)
Profiling user-trigger dependence for Android malware detection
Karim O. Elish et al.
COMPUTERS & SECURITY (2015)
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps
Li Li et al.
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1 (2015)
Static Control-Flow Analysis of User-Driven Callbacks in Android Applications
Shengqian Yang et al.
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1 (2015)
More Sound Static Handling of Java Reflection
Yannis Smaragdakis et al.
PROGRAMMING LANGUAGES AND SYSTEMS, APLAS 2015 (2015)
Effective Soundness-Guided Reflection Analysis
Yue Li et al.
STATIC ANALYSIS (SAS 2015) (2015)
Information-Flow Analysis of Android Applications in DroidSafe
Michael Gordon et al.
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) (2015)
Collaborative Verification of Information Flow for a High-Assurance App Store
Michael D. Ernst et al.
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2014)
Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets
Kai Chen et al.
36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014) (2014)