2015
- Shengqian Yang, Hailong Zhang, Haowei Wu, Yan Wang, Dacong Yan, and Atanas Rountev, Static Window Transition Graphs for Android, In Proceedings of the International conference on Automated software engineering, 2015 [pdf]
- Reyhaneh Jabbarvand, Alireza Sadeghi, Joshua Garcia, Sam Malek, and Paul Ammann, EcoDroid: an approach for energy-based ranking of Android apps, In Proceedings of the International Workshop on Green and Sustainable Software, 2015 [pdf]
- Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel, IccTA : Detecting Inter-Component Privacy Leaks in Android Apps, In Proceedings of the International Conference on Software Engineering, 2015 [pdf]
- Chaoshun Zuo, Jianliang Wu, and Shanqing Guo, Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps, In Proceedings of the ACM Symposium on Information, Computer and Communications Security, 2015 [pdf]
- Sufatrio, Tong-Wei Chua, Darell J.J. Tan, and Vrizlynn L.L. Thing, Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments, In Proceedings of the European Symposium on Research in Computer Security, 2015 [pdf]
- Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, and Guofei Jiang, Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting, In Proceedings of the ISOC Network and Distributed System Security Symposium, 2015 [pdf]
- Dennis Titze, Julian Schütte, Apparecium: Revealing Data Flows in Android Applications, In Proceedings of the International Conference on Advanced Information Networking and Applications, 2015 [pdf]
- Kristopher Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey S. Foster, and Michael R. Clarkson, Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution, In Proceedings of the European Symposium on Research in Computer Security, 2015 [pdf]
- Yu Lin,Semih Okur, Danny Dig, Study and Refactoring of Android Asynchronous Programming, In Proceedings of the International conference on Automated software engineering, 2015 [pdf]
- Behnaz Hassanshahi, Yaoqi Jia, Roland H. C. Yap, Prateek Saxena, and Zhenkai Liang, Web-to-Application Injection Attacks on Android: Characterization and Detection, In Proceedings of the European Symposium on Research in Computer Security, 2015 [pdf]
- Le Yu, Tao Zhang, Xiapu Luo, Lei Xue, AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications, In Proceedings of the ACM workshop on Security and privacy in smartphones & mobile devices, 2015 [pdf]
- Mingyuan Xia, Lu Gong, Yuanhao Lyu, Zhengwei Qi, and Xue Liu, Effective Real-Time Android Application Auditing, In Proceedings of the IEEE Symposium on Security and Privacy, 2015 [pdf]
- Steven Arzt, Siegfried Rasthofer, Robert Hahn, and Eric Bodden, Using targeted symbolic execution for reducing false-positives in dataflow analysis, In Proceedings of the International Workshop on the State Of the Art in Java Program Analysis, 2015 [pdf]
- Wei Yang, Xusheng Xiao, Benjamin Andow, Sihan Li, Tao Xie, and William Enck, AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context, In Proceedings of the International Conference on Software Engineering, 2015 [pdf]
- Wei Huang, Yao Dong Ana Milanova, and Julian Dolby, Scalable and precise taint analysis for Android, In Proceedings of the International Symposium on Software Testing and Analysis, 2015 [pdf]
- Agostino Cortesi, Pietro Ferrara, Marco Pistoia, and Omer Tripp, Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications, In Proceedings of the International Conference on Verification, Model Checking, and Abstract Interpretation, 2015 [pdf]
- Shengqian Yang, Dacong Yan, Haowei Wu, Yan Wang, and Atanas Rountev, Static Control-Flow Analysis of User-Driven Callbacks in Android Applications, In Proceedings of the International Conference on Software Engineering, 2015 [pdf]
- Dimitris Geneiatakis, Igor Nai Fovino, Ioannis Kounelis, Paquale Stirparo, A Permission verification approach for android mobile applications, In Computers & Security, 2015 [pdf]
- Nariman Mirzaei, Hamid Bagheri, Riyadh Mahmood, and Sam Malek, SIG-Droid: Automated system input generation for Android applications, In Proceedings of the International Symposium on Software Reliability Engineering, 2015 [pdf]
- Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, and Yan Chen, Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android, In Proceedings of the EAI International Conference on Security and Privacy in Communication Networks, 2015 [pdf]
- Nicolo Andronio, Stefano Zanero, and Federico Maggi, HelDroid: Dissecting and Detecting Mobile Ransomware, In Proceedings of the International Symposium on. Research in Attacks, Intrusions and Defenses, 2015 [pdf]
- Xin Chen, and Sencun Zhu, DroidJust: automated functionality-aware privacy leakage analysis for Android applications, In Proceedings of the ACM conference on Security and Privacy in Wireless and Mobile Networks, 2015 [pdf]
- Daniele Gallingani, Rigel Gjomemo, V.N. Venkatakrishnan, and Stefano Zanero, Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications, In Proceedings of the Workshop on Mobile Security Technologies, 2015 [pdf]
- Jianliang Wu, Tingting Cui, Tao Ban, Shanqing Guo, and Lizhen Cui, PaddyFrog: systematically detecting confused deputy vulnerability in Android applications, In Security and Communication Networks, 2015 [pdf]
- Mu Zhang, Yue Duan, Qian Feng, Heng Yin, Towards Automatic Generation of Security-Centric Descriptions for Android Apps, In Proceedings of the ACM conference on Computer and communications security, 2015 [pdf]
- Yury Zhauniarovich, Maqsood Ahmad, Olga Gadyatskaya, Bruno Crispo, and Fabio Massacci, StaDynA : Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications, In Proceedings of the ACM Conference on Data and Applications Security, 2015 [pdf]
- Michael I. Gordon, Deokhwan Kim, Jeff Perkins, Limei Gilham, Nguyen Nguyen, and Martin Rinard, Information-Flow Analysis of Android Applications in DroidSafe, In Proceedings of the ISOC Network and Distributed System Security Symposium, 2015 [pdf]
- Hamid Bagheri, Alireza Sadeghi, Joshua Garcia, and Sam Malek, COVERT: Compositional Analysis of Android Inter-App Permission Leakage, In IEEE Transactions on Software Engineering, 2015 [pdf]
- Sam Blackshear, Bor-Yuh Evan Chang, and Manu Sridharan, Selective Control-Flow Abstraction via Jumping, In Proceedings of the ACM SIGPLAN international conference on Object oriented programming systems languages & applications, 2015 [pdf]
- Gholamreza Safi, Arman Shahbazian, William G.J. Halfond, and Nenad Medvidovic, Detecting Event Anomalies in Event-Based Systems, In Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2015 [pdf]
- Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, and Yves Le Traon, ApkCombiner : Combining Multiple Android Apps to Support Inter-App Analysis, In Proceedings of the International Information Security and Privacy Conference, 2015 [pdf]
- Damien Octeau, Daniel Luchaup, Matthew Dering, Somesh Jha, and Patrick McDaniel, Composite Constant Propagation: Application to Android Inter-Component Communication Analysis, In Proceedings of the International Conference on Software Engineering, 2015 [pdf]
- Xingmin Cui, Jingxuan Wang, Lucas C.K.Hui, Zhongwei Xie, Tian Zeng, and S.M.Yiu, WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps, In Proceedings of the ACM conference on Security and Privacy in Wireless and Mobile Networks, 2015 [pdf]
- Osbert Bastani, Saswat Anand, and Alex Aiken, Interactively verifying absence of explicit information flows in Android apps, In Proceedings of the ACM SIGPLAN international conference on Object oriented programming systems languages & applications, 2015 [pdf]
- Ding Li, Yingjun Lyu, Mian Wan, and William G. J. Halfond, String Analysis for Java and Android Applications, In Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2015 [pdf]
- Yajin Zhou, Lei Wu, Zhi Wang, and Xuxian Jiang, Harvesting developer credentials in Android apps, In Proceedings of the ACM conference on Security and Privacy in Wireless and Mobile Networks, 2015 [pdf]
2014
- Atanas Rountev, and Dacong Yan, Static Reference Analysis for GUI Objects in Android Software, In Proceedings of Annual International Symposium on Code Generation and Optimization, 2014 [pdf]
- David Sounthiraraj, Justin Sahs, Garret Greenwood, Zhiqiang Lin, and Latifur Khan, SMV-HUNTER: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps, In Proceedings of the ISOC Network and Distributed System Security Symposium, 2014 [pdf]
- Fengguo Wei, Sankardas Roy, Xinming Ou, and Robby, Amandroid : A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps Categories and Subject Descriptors, In Proceedings of the ACM conference on Computer and communications security, 2014 [pdf]
- Yu Feng, Saswat Anand, Isil Dillig, and Alex Aiken, Apposcopy : Semantics-Based Detection of Android Malware Through Static Analysis, In Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2014 [pdf]
- Shao Shuai, Dong Guowei, Guo Tao, Yang Tianchang, and Shi Chenjie, Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications, In Proceedings of the International Conference on Dependable, Autonomic and Secure Computing, 2014 [pdf]
- Timothy Vidas, Jiaqi Tan, Jay Nahata, Chaur Lih Tan, Nicolas Christin, and Patrick Tague, A5 : Automated Analysis of Adversarial Android Applications, In Proceedings of the ACM workshop on Security and privacy in smartphones & mobile devices, 2014 [pdf]
- Julian Schütte, Dennis Titze, and J. M. de Fuentes, AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking Into Android Apps, In Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications, 2014 [pdf]
- Steffen Lortz, Heiko Mantel, Artem Starostin,Timo Bähr, David Schneider, and Alexandra Weber, Cassandra: Towards a Certifying App Store for Android, In Proceedings of the ACM workshop on Security and privacy in smartphones & mobile devices, 2014 [pdf]
- Mariem Graa, Nora Cuppens-Boulahia, Frédé́ric Cuppens, and Ana Cavalli, Protection against Code Obfuscation Attacks based on control dependencies in Android Systems, In Proceedings of the International Conference on Software Security and Reliability, 2014 [pdf]
- Yepang Liu, Chang Xu, and S.C. Cheung, Characterizing and detecting performance bugs for smartphone applications, In Proceedings of the International Conference on Software Engineering, 2014 [pdf]
- Riyadh Mahmood, Nariman Mirzaei, and Sam Malek, EvoDroid: segmented evolutionary testing of Android apps, In Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2014 [pdf]
- Kwanghoon Choi, and Byeong-Mo Chang, A type and effect system for activation flow of components in Android programs, In Information Processing Letters, 2014 [pdf]
- Zhihui Han, Liang Cheng, Yang Zhang, Shuke Zeng, Yi Deng, and Xiaoshan Sun, Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones, In Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications, 2014 [pdf]
- Kai Chen, Peng Liu, and Yingjun Zhang, Achieving accuracy and scalability simultaneously in detecting application clones on Android markets, In Proceedings of the International Conference on Software Engineering, 2014 [pdf]
- Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, and Giovanni Vigna, Execute this! analyzing unsafe and malicious dynamic code loading in android applications, In Proceedings of the ISOC Network and Distributed System Security Symposium, 2014 [pdf]
- Feng Shen, Namita Vishnubhotla, Chirag Todarka, Mohit Arora, Babu Dhandapani, Eric John Lehner, Steven Y. Ko, and Lukasz Ziarek, Information flows as a permission mechanism, In Proceedings of the International conference on Automated software engineering, 2014 [pdf]
- Wenjun Hu, Jing Tao, Xiaobo Ma, Wenyu Zhou, Shuang Zhao, and Ting Han, MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph, In Proceedings of the International Conference on Computer Communication and Networks, 2014 [pdf]
- Ding Li, Angelica Huyen Tran, and William G. J. Halfond, Making web applications more energy efficient for OLED smartphones, In Proceedings of the International Conference on Software Engineering, 2014 [pdf]
- Erik Ramsgaard Wognsen, Henrik Søndberg Karlsen, Mads Chr. Olesen, and René Rydhof Hansen, Formalisation and analysis of Dalvik bytecode, In Science of Computer Programming, 2014 [pdf]
- Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, and Sotiris Ioannidis, AndRadar: Fast Discovery of Android Applications in Alternative Markets, In Proceedings of the International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 2014 [pdf]
- Yu Lin, Cosmin Radoi, and Danny Dig, Retrofitting concurrency for Android applications through refactoring, In Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2014 [pdf]
- Jialiu Lin, Bin Liu, Norman Sadeh, Jason I. Hong, Modeling Users' Mobile App Privacy Preferences : Restoring Usability in a Sea of Permission Settings, In Proceedings of the USENIX Symposium on Usable Privacy and Security, 2014 [pdf]
- Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel, FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps, In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014 [pdf]
- Max Lillack, Christian Kästner, and Eric Bodden, Tracking Load-time Configuration Options, In Proceedings of the International conference on Automated software engineering, 2014 [pdf]
- Mu Zhang, Yue Duan, Heng Yin, and Zhiruo Zhao, Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs Categories and Subject Descriptors, In Proceedings of the ACM conference on Computer and communications security, 2014 [pdf]
- Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang, and David Wetherall, Brahmastra: Driving Apps to Test the Security of Third-Party Components, In Proceedings of the USENIX Security Symposium, 2014 [pdf]
- Alexandre Bartel, Jacques Klein, Martin Monperrus, and Yves Le Traon, Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android, In IEEE Transactions on Software Engineering, 2014 [pdf]
- Tristan Ravitch, E. Rogan Creswick, Aaron Tomb, Adam Foltzer, Trevor Elliott, and Ledah Casburn, Multi-App Security Analysis with FUSE : Statically Detecting Android App Collusion, In Proceedings of the Program Protection and Reverse Engineering Workshop, 2014 [pdf]
- Mu Zhang, and Heng Yin, Efficient, Context-Aware Privacy Leakage Confinement for Android Applications without Firmware Modding, In Proceedings of the ACM Symposium on Information, Computer and Communications Security, 2014 [pdf]
- Michael D. Ernst, René Just, Suzanne Millstein, Werner Dietl,Stuart Pernsteiner, Franziska Roesner, Karl Koscher, Paulo Barros, Ravi Bhoraskar, Seungyeop Han, Paul Vines, and Edward X. Wu, Collaborative Verification of Information Flow for a High-Assurance App Store, In Proceedings of the ACM conference on Computer and communications security, 2014 [pdf]
- Xin Sun, Yibing Zhongyang, Zhi Xin, Bing Mao, and Li Xie, Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph, In Proceedings of the International Information Security and Privacy Conference, 2014 [pdf]
- William Klieber, Lori Flynn, Amar Bhosale, Limin Jia, and Lujo Bauer, Android taint flow analysis for app sets, In Proceedings of the International Workshop on the State Of the Art in Java Program Analysis, 2014 [pdf]
- Mu Zhang, and Heng Yin, AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications, In Proceedings of the ISOC Network and Distributed System Security Symposium, 2014 [pdf]
- Chia-Mei Chen, Je-Ming Lin, and Gu-Hsin Lai, Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code, In Proceedings of the International Conference on Trustworthy Systems and their Applications, 2014 [pdf]
- Jianjun Huang, Xiangyu Zhang, Lin Tan, Peng Wang, and Bin Liang, AsDroid : Detecting Stealthy Behaviors in Android Applications by User Interface and Program Behavior Contradiction, In Proceedings of the International Conference on Software Engineering, 2014 [pdf]
2013
- Jianlin Xu, Yifan Yu, Zhen Chen, Bin Cao, Wenyu Dong, Yu Guo, and Junwei Cao, MobSafe: cloud computing based forensic analysis for massive mobile applications using data mining, In Tsinghua Science and Technology, 2013 [pdf]
- Siyuan Ma, Zhushou Tang, Qiuyu Xiao, Jiafa Liu, Tran Triet Duong, Xiaodong Lin, and Haojin Zhu, Detecting GPS information leakage in Android applications, In Proceedings of the IEEE Global Communications Conference, 2013 [pdf]
- Bruno P. S. Rocha, Mauro Conti, Sandro Etalle, and Bruno Crispo, Hybrid static-runtime information flow and declassification enforcement, In IEEE Transactions on Information Forensics and Security, 2013 [pdf]
- Luoshi Zhang, Yan Niu, Xiao Wu, Zhaoguo Wang, and Yibo Xue, A3: Automatic Analysis of Android Malware, In Proceedings of the International Workshop on Cloud Computing and Information Security, 2013 [pdf]
- Tanzirul Azim, and Iulian Neamtiu, Targeted and depth-first exploration for systematic testing of android apps, In Proceedings of the ACM SIGPLAN international conference on Object oriented programming systems languages & applications, 2013 [pdf]
- Wei Yang, Mukul R. Prasad, and Tao Xie, A grey-box approach for automated GUI-model generation of mobile applications, In Proceedings of the International Conference on Fundamental Approaches to Software Engineering, 2013 [pdf]
- Jonathan Crussell, Clint Gibler, and Hao Chen, Scalable semantics-based detection of similar Android applications, In Proceedings of the European Symposium on Research in Computer Security, 2013 [pdf]
- Johannes Hoffmann, Martin Ussath, Thorsten Holz, and Michael Spreitzenbarth, Slicing droids: program slicing for smali code, In Proceedings of the Annual ACM Symposium on Applied Computing, 2013 [pdf]
- Sam Blackshear, Bor-Yuh Evan Chang, and Manu Sridharan, Thresher: precise refutations for heap reachability, In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2013 [pdf]
- Hugo Gascon, Fabian Yamaguchi, Daniel Arp, and Konrad Rieck, Structural Detection of Android Malware using Embedded Call Graphs, In Proceedings of the ACM Workshop on Artificial Intelligence and Security, 2013 [pdf]
- Chaorong Guo, Jian Zhang, Jun Yan, Zhiqiang Zhang, Yanli Zhang, Characterizing and detecting resource leaks in Android applications, In Proceedings of the International conference on Automated software engineering, 2013 [pdf]
- Yibing Zhongyang, Zhi Xin, Bing Mao, and Li Xie, DroidAlarm: an all-sided static analysis tool for android privilege-escalation malware, In Proceedings of the ACM Symposium on Information, Computer and Communications Security, 2013 [pdf]
- Ding Li, Shuai Hao, William G.J. Halfond, and Ramesh Govindan, Calculating source line level energy information for Android applications, In Proceedings of the International Symposium on Software Testing and Analysis, 2013 [pdf]
- Steffen Bartsch, Bernhard Berger, Michaela Bunke, and Karsten Sohr, The Transitivity-of-Trust Problem in Android Application Interaction, In Proceedings of the International Conference on Availability, Reliability and Security, 2013 [pdf]
- Shuai Hao, Ding Li, William G.J. Halfond, and Ramesh Govindan, SIF: A Selective Instrumentation Framework for Mobile Applications, In Proceeding of the annual international conference on Mobile systems, applications, and services, 2013 [pdf]
- Shuying Liang, Andrew W. Keep, Matthew Might, Steven Lyde, Thomas Gilray, Petey Aldous, and David Van Horn, Sound and precise malware analysis for android via pushdown reachability and entry-point saturation, In Proceedings of the ACM workshop on Security and privacy in smartphones & mobile devices, 2013 [pdf]
- Drago Sbîrlea, Michael G. Burke,Salvatore Guarnieri, Marco Pistoia, and Vivek Sarkar, Automatic Detection of Inter-application Permission Leaks in Android Applications, In IBM Journal of Research and Development, 2013 [pdf]
- Yajin Zhou, and Xuxian Jiang, Detecting passive content leaks and pollution in android applications, In Proceedings of the ISOC Network and Distributed System Security Symposium, 2013 [pdf]
- Lei Wu, Michael Grace, Yajin Zhou, Chiachih Wu, and Xuxian Jiang, The impact of vendor customizations on android security, In Proceedings of the ACM conference on Computer and communications security, 2013 [pdf]
- Shuai Hao, Ding Li, William G. J. Halfond, Ramesh Govindan, Estimating mobile application energy consumption using program analysis, In Proceedings of the International Conference on Software Engineering, 2013 [pdf]
- Manuel Egele, David Brumley, Yanick Fratantonio, and Christopher Kruegel, An empirical study of cryptographic misuse in android applications, In Proceedings of the ACM conference on Computer and communications security, 2013 [pdf]
- Kevin Zhijie Chen, Noah Johnson, Vijay D’Silva, Shuaifu Dai, Kyle MacNamara, Tom Magrino, Edward Wu, Martin Rinard, and Dawn Song, Contextual Policy Enforcement in Android Applications with Permission Event Graphs, In Proceedings of the ISOC Network and Distributed System Security Symposium, 2013 [pdf]
- Casper S. Jensen, Mukul R. Prasad, and Anders Møller, automated testing with targeted event sequence generation, In Proceedings of the International Symposium on Software Testing and Analysis, 2013 [pdf]
- Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, and Yves Le Traon, Effective Inter-Component Communication Mapping in Android with Epicc : An Essential Step Towards Holistic Security Analysis, In Proceedings of the USENIX Security Symposium, 2013 [pdf]
- Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, and X. Sean Wang, AppIntent : Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection, In Proceedings of the ACM conference on Computer and communications security, 2013 [pdf]
2012
- Jinseong Jeon, Kristopher K. Micinski, Jeffrey A. Vaughan, Ari Fogel, Nikhilesh Reddy, Jeffrey S. Foster, and Todd Millstein, Dr . Android and Mr . Hide : Fine-grained Permissions in Android Applications Categories and Subject Descriptors, In Proceedings of the ACM workshop on Security and privacy in smartphones & mobile devices, 2012 [pdf]
- Ying Zhang, Gang Huang, Xuanzhe Liu, Wei Zhang, Hong Mei, and Shunxiang Yang, Refactoring android Java code for on-demand computation offloading, In Proceedings of the ACM SIGPLAN international conference on Object oriented programming systems languages & applications, 2012 [pdf]
- Jonathan Crussell, Clint Gibler, and Hao Chen, Attack of the clones: detecting cloned applications on Android markets, In Proceedings of the European Symposium on Research in Computer Security, 2012 [pdf]
- Alexandre Bartel, Jacques Klein, Yves Le Traon, and Martin Monperrus, Automatically securing permission-based software by reducing the attack surface: An application to android, In Proceedings of the International conference on Automated software engineering, 2012 [pdf]
- Étienne Payeta, and Fausto Spotob, Static analysis of Android programs, In Information and Software Technology, 2012 [pdf]
- Michael Grace, Yajin Zhou, Zhi Wang, and Xuxian Jiang, Systematic Detection of Capability Leaks in Stock Android Smartphones., In Proceedings of the ISOC Network and Distributed System Security Symposium, 2012 [pdf]
- Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, and Ana Cavalli, Detecting control flow in smarphones: Combining static and dynamic analyses, In Proceedings of the International Symposium on Cyberspace Safety and Security, 2012 [pdf]
- Panagiotis Vekris, Ranjit Jhala, Sorin Lerner, and Yuvraj Agarwal, Towards verifying android apps for the absence of no-sleep energy bugs, In Proceedings of the USENIX conference on Power-Aware Computing and Systems, 2012 [pdf]
- Abhinav Pathak, Abhilash Jindal, Y. Charlie Hu, and Samuel P. Midkiff, what is keeping my phone awake? characterizing and detecting no-sleep energy bugs in smartphone apps, In Proceeding of the annual international conference on Mobile systems, applications, and services, 2012 [pdf]
- Benjamin Davis, Ben Sanders, Armen Khodaverdian, and Hao Chen, I-ARM-Droid: A Rewriting Framework for In-App Reference Monitors for Android Applications, In Proceedings of the Workshop on Mobile Security Technologies, 2012 [pdf]
- Jinyung Kim, Yongho Yoon, and Kwangkeun Yi, and Junbum Shin, Scandal: Static Analyzer for Detecting Privacy Leaks in Android Applications, In Proceedings of the Workshop on Mobile Security Technologies, 2012 [pdf]
- Patrick P.F. Chan, Lucas C.K. Hui, S.M. Yiu, DroidChecker : Analyzing Android Applications for Capability Leak, In Proceedings of the ACM conference on Security and Privacy in Wireless and Mobile Networks, 2012 [pdf]
- Zheng Lu, and Supratik Mukhopadhyay, Model-based static source code analysis of java programs with applications to android security, In Proceedings of the Annual Computer Software and Applications Conference, 2012 [pdf]
- Chon Ju Kim, and Phyllis Frankl, AQUA: Android QUery Analyzer, In Proceedings of the Working Conference on Reverse Engineering, 2012 [pdf]
- Zhibo Zhao, and Fernando C. Colon Osorio, TrustDroid: Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking, In Proceedings of the International Conference on Malicious and Unwanted Software, 2012 [pdf]
- Anthony Desnos, Android: Static analysis using similarity distance, In Proceedings of the Hawaii International Conference on System Science, 2012 [pdf]
- Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang, CHEX : Statically Vetting Android Apps for Component Hijacking Vulnerabilities Categories and Subject Descriptors, In Proceedings of the ACM conference on Computer and communications security, 2012 [pdf]
- Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith, Lars Baumgärtner, and Bernd Freisleben, Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security, In Proceedings of the ACM conference on Computer and communications security, 2012 [pdf]
- Clint Gibler, Jonathan Crussell, Jeremy Erickson, and Hao Chen, AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale, In Proceedings of the International Conference on Trust \& Trustworthy Computing, 2012 [pdf]
- Saswat Anand, Mayur Naik, Hongseok Yang, and Mary Jean Harrold, Automated Concolic Testing of Smartphone Apps, In Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2012 [pdf]
- Michael Grace, Wu Zhou, and Xuxian Jiang, and Ahmad-Reza Sadeghi, Unsafe exposure analysis of mobile in-app advertisements, In Proceedings of the ACM conference on Security and Privacy in Wireless and Mobile Networks, 2012 [pdf]
- Christopher Mann, and Artem Starostin, A framework for static detection of privacy leaks in android applications, In Proceedings of the Annual ACM Symposium on Applied Computing, 2012 [pdf]
- Jingtian Wang, Guoquan wu, Xiaoquan Wu, Jun Wei, Detect and optimize the energy consumption of mobile app through static analysis: an initial research, In Proceedings of the Asia-Pacific Symposium on Internetware, 2012 [pdf]
- Cong Zheng, Shixiong Zhu, Shuaifu Dai, Guofei Gu, Xiaorui Gong, Xinhui Han, and Wei Zou, Smartdroid: an automatic system for revealing ui-based trigger conditions in android applications, In Proceedings of the ACM workshop on Security and privacy in smartphones & mobile devices, 2012 [pdf]
2011
- Erika Chin, Adrienne Porter Felt, Kate Greenwood, and David Wagner, Analyzing Inter-Application Communication in Android, In Proceeding of the annual international conference on Mobile systems, applications, and services, 2011 [pdf]
- Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik, and Ashwin Patti, Clonecloud: elastic execution between mobile device and cloud, In Proceedings of the European Conference on Computer Systems, 2011 [pdf]
- Leonid Batyuk, Markus Herpich, Seyit Ahmet Camtepe, Karsten Raddatz, Aubrey-Derrick Schmidt, and Sahin Albayrak, Using Static Analysis for Automatic Assessment and Mitigation of Unwanted and Malicious Activities Within Android Applications, In Proceedings of the International Conference on Malicious and Unwanted Software, 2011 [pdf]
- Anthony Desnos, and Geoffroy Gueguen, Android : From Reversing to Decompilation, In BlackHat, 2011 [pdf]