Topics

No keywords indexed for this article. Browse by subject →

References
189
[1]
Gartner, gartner says sales of smartphones grew 20 percent in third quarter of 2014 https://www.gartner.com/newsroom/id/2944819/. Accessed: 2015-08-22.
[2]
Developer economics q1 2015: state of the developer nation, 0000, https://www.developereconomics.com/reports/developer-economics-q1-2015/. Accessed: 2015-08-22.
[3]
G Data: Mobile Malware Report, 0000, https://public.gdatasoftware.com/Presse/Publikationen/Malware_Reports/G_DATA_MobileMWR_Q2_2015_EN.pdf. Accessed: 2015-08-22.
[4]
Payet "Static analysis of android programs" Inf. Softw. Technol. (2012) 10.1016/j.infsof.2012.05.003
[5]
Moran "Auto-completing bug reports for android applications" (2015)
[6]
Arzt "Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps" (2014)
[7]
Li "IccTA: detecting inter-component privacy leaks in Android apps" (2015)
[8]
Lu "Chex: statically vetting android apps for component hijacking vulnerabilities" (2012)
[9]
Octeau "Effective inter-component communication mapping in android with epicc: an essential step towards holistic security analysis" (2013)
[10]
Tan "Securing android: a survey, taxonomy, and challenges" ACM Comput. Surv. (2015)
[11]
Bartel (2014)
[12]
Lam "The soot framework for java program analysis: a retrospective" (2011)
[13]
S. Fink, J. Dolby, Wala–the tj watson libraries for analysis, 2012.
[14]
Aho (1986)
[15]
Dean "Optimization of object-oriented programs using static class hierarchy analysis" (1995)
[16]
Bacon "Fast static analysis of c++ virtual function calls" ACM Sigplan Not. (1996) 10.1145/236338.236371
[17]
V. Sundaresan, L.J. Hendren, C. Razafimahefa, R. Vallée-Rai, P. Lam, E. Gagnon, C. Godin, Practical virtual method call resolution for java, in: Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA ’00), 2000, pp. 264–280. https://www.sable.mcgill.ca/publications. 10.1145/354222.353189
[18]
Andersen (1994)
[19]
Steensgaard "Points-to analysis in almost linear time" (1996)
[20]
Liang "Caiipa: automated large-scale mobile app testing through contextual fuzzing" (2014)
[21]
Adamsen "Systematic execution of android test suites in adverse conditions" (2015)
[22]
Zaeem "Automated generation of oracles for testing user-interaction features of mobile apps" (2014)
[23]
Moran "Automatically discovering, reporting and reproducing android application crashes" (2016)
[24]
B. Kitchenham, Procedures for performing systematic reviews(2004).
[25]
Nguyen "An extensive systematic review on the model-driven development of secure systems" Inf. Softw. Technol. (2015) 10.1016/j.infsof.2015.08.006
[26]
Google scholar metrics: available metrics, 0000, https://scholar.google.com.sg/intl/en/scholar/metrics.html#metrics. Accessed: 2015-08-22.
[27]
Au "Pscout: analyzing the android permission specification" (2012)
[28]
Cao "Edgeminer: automatically detecting implicit control flow transitions through the android framework" (2015)
[29]
A.P. Fuchs, A. Chaudhuri, J.S. Foster, Scandroid: automated security certification of android (2009).
[30]
L. Li, A. Bartel, J. Klein, Y. Le Traon, S. Arzt, S. Rasthofer, E. Bodden, D. Octeau, P. Mcdaniel, I know what leaked in your pocket: uncovering privacy leaks on android apps with static taint analysis, arXiv preprint arXiv:1404.7431 (2014).
[31]
Hanna "Juxtapp: a scalable system for detecting code reuse among android applications" (2012)
[32]
B. Kitchenham, S. Charters, Guidelines for performing systematic literature reviews in software engineering, 2007.
[33]
Hu "Migdroid: Detecting app-repackaging android malware via method invocation graph" (2014)
[34]
Chun "Clonecloud: elastic execution between mobile device and cloud" (2011)
[35]
Rasthofer "Droidforce: enforcing complex, data-centric, system-wide policies in android" (2014)
[36]
Klieber "Android taint flow analysis for app sets" (2014)
[37]
Avdiienko "Mining apps for abnormal usage of sensitive data" (2015)
[38]
Li "Automatically exploiting potential component leaks in android applications" (2014)
[39]
Octeau "Composite constant propagation: Application to android inter-component communication analysis" (2015)
[40]
Zhou "Detecting passive content leaks and pollution in android applications" (2013)
[41]
Bartel "Automatically securing permission-based software by reducing the attack surface: an application to android" (2012)
[42]
Bartel "Static analysis for extracting permission checks of a large scale framework: the challenges and solutions for analyzing android" Softw. Eng. IEEE Trans. (2014) 10.1109/tse.2014.2322867
[43]
Li "Making web applications more energy efficient for OLED smartphones" (2014)
[44]
Li "Calculating source line level energy information for android applications" (2013)
[45]
Linares-Vásquez "Mining energy-greedy api usage patterns in android apps: an empirical study" (2014)
[46]
Ruiz "Understanding reuse in the android market" (2012)
[47]
Mojica "A large-scale empirical study on software reuse in mobile apps" IEEE Softw. (2014) 10.1109/ms.2013.142
[48]
Crussell "Attack of the clones: Detecting cloned applications on android markets" (2012)
[49]
Crussell "Andarwin: Scalable detection of semantically similar android applications" (2013)
[50]
Linares-Vásquez "Revisiting android reuse studies in the context of code obfuscation and library usages" (2014)

Showing 50 of 189 references

Cited By
266
ACM Transactions on Software Engine...
Deepfake Detection: A Systematic Literature Review

Md Shohel Rana, Mohammad Nur Nobi · 2022

IEEE Access
The Android Platform Security Model

René Mayrhofer, Jeffrey Vander Stoep · 2021

ACM Transactions on Privacy and Sec...
Metrics
266
Citations
189
References
Details
Published
Aug 01, 2017
Vol/Issue
88
Pages
67-95
License
View
Funding
Fonds National de la Recherche Award: C13/IS/5921289
Cite This Article
Li Li, Tegawendé F. Bissyandé, Mike Papadakis, et al. (2017). Static analysis of android apps: A systematic literature review. Information and Software Technology, 88, 67-95. https://doi.org/10.1016/j.infsof.2017.04.001
Related

You May Also Like