The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2011 6th International Conference on Malicious and Unwanted Software 2011
DOI: 10.1109/malware.2011.6112328
|View full text |Cite
|
Sign up to set email alerts
|

Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications

Abstract: In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smartphone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private info… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
81
0
3

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 114 publications
(84 citation statements)
references
References 8 publications
0
81
0
3
Order By: Relevance
“…A dynamic approach is presented in [21] where the authors proposed a syscall monitoring approach further used to identify malicious signatures. Batyuk et al introduce in [22] a solution aiming at disassembling code and looking at malicious API use. DroidMat [10] extracts information about Intent, API calls and permissions in order to classify applications in using clustering techniques.…”
Section: Related Workmentioning
confidence: 99%
“…A dynamic approach is presented in [21] where the authors proposed a syscall monitoring approach further used to identify malicious signatures. Batyuk et al introduce in [22] a solution aiming at disassembling code and looking at malicious API use. DroidMat [10] extracts information about Intent, API calls and permissions in order to classify applications in using clustering techniques.…”
Section: Related Workmentioning
confidence: 99%
“…4 Our prototype allows to process Android binaries (i. e., APK files) directly. Using WALA's Java front-end, the analysis of Java source of Android apps can be supported easily as well.…”
Section: Methodsmentioning
confidence: 99%
“…There is a large body of work that uses static program analysis for finding security vulnerabilities in JavaScript-based web applications [11,16,24,26] as well as dealing with the privacy concerns of Android apps [4,13,18,20].…”
Section: Related Workmentioning
confidence: 99%
“…[9] Some of the critical permissions like accessing messages, making phone call and similar permissions were given a two-step verification. The user's permission is again asked while the application requires use of critical permissions.…”
Section: Android's Initiative To Improve Security With Respect To Permentioning
confidence: 99%