2017
DOI: 10.1109/tse.2016.2615307
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
77
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 116 publications
(77 citation statements)
references
References 361 publications
0
77
0
Order By: Relevance
“…In this context, numerous efforts have proposed techniques and developed tools to detect different vulnerabilities (and malicious behavior) in Android apps. Given the number of proposed techniques and available tools, there have been recent efforts to assess the capabilities of these tools and techniques [Reaves et al, 2016, Sadeghi et al, 2017, Pauck et al, 2018. However, these assessments are subject to one or more of the following limiting factors:…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…In this context, numerous efforts have proposed techniques and developed tools to detect different vulnerabilities (and malicious behavior) in Android apps. Given the number of proposed techniques and available tools, there have been recent efforts to assess the capabilities of these tools and techniques [Reaves et al, 2016, Sadeghi et al, 2017, Pauck et al, 2018. However, these assessments are subject to one or more of the following limiting factors:…”
Section: Motivationmentioning
confidence: 99%
“…Despite these differences, the effort by Reaves et al is closely related to our evaluation. Sadeghi et al [2017] conducted an exhaustive literature review of the use of program analysis techniques to address issues related to Android security. They identified trends, patterns, and gaps in existing literature along with the challenges and opportunities for future research.…”
Section: Related Workmentioning
confidence: 99%
“…Providing an overview of analysis tools for Android apps is the topic of three recent surveys [18,23,25]. These works collect and summarize tools and their functionality as outlined in research papers.…”
Section: Related Workmentioning
confidence: 99%
“…In other words, compromising security allows to compromise the other two concepts. Given this assumption, a sensible next step for categorising the extensive literature on static analysis is the work of Sadeghi et al who consider both security and privacy (data protection) in the context of the Android operating system and its software ecosystem [35]. They categorise different research approaches by considering the problems addressed ("what") and the solutions to the problems ("how").…”
Section: Background and Related Workmentioning
confidence: 99%