2020
DOI: 10.26599/tst.2019.9010067
|View full text |Cite
|
Sign up to set email alerts
|

A novel hybrid method to analyze security vulnerabilities in Android applications

Abstract: We propose a novel hybrid method to analyze the security vulnerabilities in Android applications. Our method combines static analysis, which consists of metadata and data flow analyses with dynamic analysis, which includes dynamic executable scripts and application program interface hooks. Our hybrid method can effectively analyze nine major categories of important security vulnerabilities in Android applications. We design dynamic executable scripts that record and perform manual operations to customize the e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0
3

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(21 citation statements)
references
References 14 publications
0
18
0
3
Order By: Relevance
“…In this step, we use Ex (A, pi, feeA,i) to represent the expense of club CA incurred by the transfer fee feeA,i of player pi (i = 1, 2, …, n). Thus, for club CA, all its transfer fee expense forms a transfer expense vector (denoted by TEVA) shown in (7). Similar to TIVA in (1), TEVA is also an n-dimensional vector.…”
Section: Solution: Tptelsh+bmentioning
confidence: 99%
See 1 more Smart Citation
“…In this step, we use Ex (A, pi, feeA,i) to represent the expense of club CA incurred by the transfer fee feeA,i of player pi (i = 1, 2, …, n). Thus, for club CA, all its transfer fee expense forms a transfer expense vector (denoted by TEVA) shown in (7). Similar to TIVA in (1), TEVA is also an n-dimensional vector.…”
Section: Solution: Tptelsh+bmentioning
confidence: 99%
“…Generally, legal player transfer events are helpful and beneficial for the whole sport industry including football field. However, in certain situations, the multiple clubs involved in a player transfer event are apt to hide their inner transfer transaction details, as to gain more social or economic profits [6][7][8][9]. For example, some football clubs have taken part in the illegal laundering money crime activities through modifying the transfer fees of a player in player transfer events.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, the fairness of delegating computation is one of the hot topics in current research, and the existing researches utilize a trusted third-party (e.g., bank [11], semi-trusted third-party [12,13], trusted third-party [14,15]) to overcome these issues. However, in the protocol process, with a third-party, the potential security problems will inevitably occur [16,17], e.g., unreasonable Nash equilibrium, privacy leakage, and low efficiency. To eliminate the drawbacks, many researchers adopt smart contracts to realize the Peer-to-Peer (P2P) transaction between the clients and the computing parties [18].…”
Section: Introductionmentioning
confidence: 99%
“…The last aspect is a major challenge since it preserves confidentiality, integrity and availability of user data. On Android, most of the approaches use static analysis relying on static features related to applications [7][8][9][10][11], dynamic analysis relying on features observed during their execution [12][13][14] and hybrid analysis combining the both [15][16][17]. Despite Google Play Protect provided by Google, to filter threats, there are still malicious applications carefully designed by bad people to have an impact on the security and privacy of users [8,18].…”
Section: Introductionmentioning
confidence: 99%