Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015
DOI: 10.1145/2810103.2813669
|View full text |Cite
|
Sign up to set email alerts
|

Towards Automatic Generation of Security-Centric Descriptions for Android Apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(32 citation statements)
references
References 27 publications
0
32
0
Order By: Relevance
“…In 2015, Zhang et al [251] argued that the descriptions given to apps contain insufficient security information. The authors presented the DescribeMe system, which generates security-centric descriptions using static analysis.…”
Section: Vulnerabilitymentioning
confidence: 99%
“…In 2015, Zhang et al [251] argued that the descriptions given to apps contain insufficient security information. The authors presented the DescribeMe system, which generates security-centric descriptions using static analysis.…”
Section: Vulnerabilitymentioning
confidence: 99%
“…Zhang et al [17] developed a novel approach that can use the result of static program analysis to automatically produce security-centric android application descriptions. Yu et al [18] designed AutoPPG to automatically generate correct and readable privacy policy for Android applications by applying natural language processing techniques on the result of static code analysis.…”
Section: Text Generationmentioning
confidence: 99%
“…Asavoae et al describe techniques for detecting collusion of Android malware applications based on their permissions [11], but do not address the detection of attacks from a networking perspective. Similarly, Zhang et al rely on the Android permissions for automatically generating security centric descriptions of applications [12], but also do not consider the validation of networking aspects. Mariconti et al detect malware by building Markov models of the applications, but this approach requires downloading and executing the byte code of the application [13].…”
Section: Related Workmentioning
confidence: 99%