[1]
Y. J. Zhou and X. X. Jiang, Detecting passive content leaks and pollution in android applications, in Proc. 20th Ann Network and Distributed System Security Symp., San Diego, CA, USA, 2013.
[2]
W. Enck, P. Gilbert, S. Han, V. Tendulkar, B. G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones, ACM Trans. Comput. Syst., vol. 32, no. 2, pp. 1-19, 2014.
[3]
D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck, Drebin: Effective and explainable detection of android malware in your pocket, in Proc. 21st Ann. Network and Distributed System Security Symp., San Diego, CA, USA, 2014, pp. 23-26.
[4]
J. Hoffmann, M. Ussath, T. Holz, and M. Spreitzenbarth, Slicing droids: Program slicing for smali code, in Proc. 28th Ann. ACM Symp. on Applied Computing, Coimbra, Portugal, 2013, pp. 1844-1851.
[8]
S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, and P. McDaniel, FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps, ACM SIGPLAN Not., vol. 49, no. 6, pp. 259-269, 2014.
[12]
I. Muslukhov, Y. Boshmaf, and K. Beznosov, Source attribution of cryptographic API misuse in android applications, in Proc. 2018 on Asia Conf, on Computer and Communications Security, Incheon, Republic of Korea, 2018, pp. 133-146.
[13]
L. Lu, Z. C. Li, Z. Y. Wu, W. Lee, and G. F. Jiang, CHEX: Statically vetting android apps for component hijacking vulnerabilities, in Proc. 2012 ACM Conf. on Computer and Communications Security, Raleigh, NC, USA, 2012, pp. 229-240.
[14]
F. Liu, C. Wang, A. Pico, D. F. Yao, and G. Wang, Measuring the insecurity of mobile deep links of android, in Proc. 26th USENIX Security Symp., Vancouver, Canada, 2017, pp. 953-969.
[15]
S. Aonzo, A. Merlo, G. Tavella, and Y. Fratantonio, Phishing attacks on modern android, in Proc. 2018 ACM SIGSAC Conf. on Computer and Communications Security, Toronto, Canada, 2018, pp. 1788-1801.
[16]
A. Possemato, A. Lanzi, S. P. H. Chung, W. Lee, and Y. Fratantonio, Clickshield: Are you hiding something? Towards eradicating Clickjacking on Android, in Proc. 2018 ACM SIGSAC Conf. on Computer and Communications Security, Toronto, Canada, 2018, pp. 1120-1136.
[17]
E. Pariwono, D. Chiba, M. Akiyama, and T. Mori, Don’t throw me away: Threats caused by the abandoned internet resources used by Android apps, in Proc. 2018 on Asia Conf. on Computer and Communications Security, Incheon, Republic of Korea, 2018, pp. 147-158.
[18]
Y. H. Nan, M. Yang, Z. M. Yang, S. F. Zhou, G. F. Gu, and X. F. Wang, Uipicker: User-input privacy identification in mobile applications, in Proc. 24th USENIX Conf. on Security Symp., Washington, DC, USA, 2015, pp. 993-1008.
[19]
Z. W. Zhang, P. Liu, J. Xiang, J. W. Jing, and L. G. Lei, How your phone camera can be used to stealthily spy on you: Transplantation attacks against android camera service, in Proc. 5th ACM Conf. on Data and Application Security and Privacy, San Antonio, TX, USA, 2015, pp. 99-110.
[20]
N. Zhang, K. Yuan, M. Naveed, X. Y. Zhou, and X. F. Wang, Leave me alone: App-level protection against runtime information gathering on android, in Proc. 2015 IEEE Symp. on Security and Privacy, San Jose, CA, USA, 2015, pp. 915-930.
[21]
C. Ma, T. Wang, L. M. Shen, D. K. Liang, S. P. Chen, and D. L. You, Communication-based attacks detection in android applications, Tsinghua Sci. Technol., vol. 24, no. 5, pp. 596-614, 2019.
[22]
Z. L. Yuan, Y. Q. Lu, and Y. B. Xue, Droiddetector: Android malware characterization and detection using deep learning, Tsinghua Sci. Technol., vol. 21, no. 1, pp. 114-123, 2016.
[23]
R. B. Yan, X. Xiao, G. W. Hu, S. C. Peng, and Y Jiang, New deep learning method to detect code injection attacks on hybrid applications, J. Syst. Software, vol. 137, pp. 67-77, 2018.
[24]
D. Maier, M. Protsenko, and T. Müller, A game of Droid and Mouse: The threat of split-personality malware on Android, Comput. Secur., vol. 54, pp. 2-15, 2015.