2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC) 2017
DOI: 10.1109/icpc.2017.14
|View full text |Cite
|
Sign up to set email alerts
|

Android Repository Mining for Detecting Publicly Accessible Functions Missing Permission Checks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…However, as discussed in Section 2.3, there are no readily available mappings between Android APIs and dangerous permissions in the Android documentation [2]. Although existing studies (e.g., [1,18,[58][59][60][61]) proposed several techniques to infer such mappings, we found that their released datasets are outdated. To precisely locate issues of Type 2, we chose to infer the mappings by ourselves.…”
Section: Keyword Formulationmentioning
confidence: 95%
See 3 more Smart Citations
“…However, as discussed in Section 2.3, there are no readily available mappings between Android APIs and dangerous permissions in the Android documentation [2]. Although existing studies (e.g., [1,18,[58][59][60][61]) proposed several techniques to infer such mappings, we found that their released datasets are outdated. To precisely locate issues of Type 2, we chose to infer the mappings by ourselves.…”
Section: Keyword Formulationmentioning
confidence: 95%
“…Existing studies [3,58,59,61,[82][83][84][85][86][87][88][89][90][91][92][93][94][95][96][97][98][99][100][101] have investigated many aspects of Android permission system. We discuss those that are most relevant to our work below.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations