Android repository mining for detecting publicly accessible functions missing permission checks
Android has become the most popular mobile operating system. Millions of applications, including many malware, haven been developed for it. Even though its overall system architecture and many APIs are documented, many other methods and implementation details are not, not to mention potential bugs a...
Saved in:
Main Authors: | NGUYEN, Huu Hoang, JIANG, Lingxiao, QUAN, Thanh Tho |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3683 https://ink.library.smu.edu.sg/context/sis_research/article/4685/viewcontent/android_analysis_draft.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Whole-system analysis for understanding publicly accessible functions in Android
by: NGUYEN, Huu Hoang, et al.
Published: (2017) -
On the effectiveness of virtualization based memory isolation on multicore platforms
by: ZHAO, Siqi, et al.
Published: (2017) -
CICC: A Fine-grained, Semantic-aware, and Transparent Approach to Preventing Permission Leaks for Android Permission Managers
by: WANG, Daibin, et al.
Published: (2015) -
API recommendation for event-driven Android application development
by: YUAN, Weizhao, et al.
Published: (2019) -
Automated Android application permission recommendation
by: BAO, Lingfeng, et al.
Published: (2017)