Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques

@article{Xu2016TowardEA,
  title={Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques},
  author={Meng Xu and Chengyu Song and Yang Ji and Ming-Wei Shih and Kangjie Lu and Cong Zheng and Ruian Duan and Yeongjin Jang and Byoungyoung Lee and Chenxiong Qian and Sangho Lee and Taesoo Kim},
  journal={ACM Comput. Surv.},
  year={2016},
  volume={49},
  pages={38:1-38:47}
}
The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these properties also leave Android vulnerable, attracting attacks for profit or fun. To mitigate these threats, numerous issue-specific solutions have been proposed. With the increasing number and complexity of security problems and solutions, we believe this is the right moment to step back and systematically re-evaluate the… CONTINUE READING
Highly Cited
This paper has 36 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 26 extracted citations

Context-Aware, Adaptive, and Scalable Android Malware Detection Through Online Learning

IEEE Transactions on Emerging Topics in Computational Intelligence • 2017
View 4 Excerpts
Highly Influenced

NDroid: Toward Tracking Information Flows Across Multiple Android Contexts

IEEE Transactions on Information Forensics and Security • 2019

Poster: On Vulnerability Evolution in Android Apps

2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion) • 2018
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 21 references

AutoCog: Measuring the Description-to-permission Fidelity in Android Applications

ACM Conference on Computer and Communications Security • 2014
View 4 Excerpts
Highly Influenced

OAuth Demystified for Mobile Application Developers

ACM Conference on Computer and Communications Security • 2014
View 4 Excerpts
Highly Influenced

AppIntent: analyzing sensitive data transmission in android for privacy leakage detection

ACM Conference on Computer and Communications Security • 2013
View 7 Excerpts
Highly Influenced

CHEX: statically vetting Android apps for component hijacking vulnerabilities

ACM Conference on Computer and Communications Security • 2012
View 5 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…