Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,279,233 papers from all fields of science
Search
Sign In
Create Free Account
Android
Known as:
Android system
, Android 3.0 Honeycomb
, Android mobile phone
Expand
Android is a mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ASUS MeMO Pad HD 7
Agent.BTZ
Android Gingerbread
BOINC
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
EvoDroid: segmented evolutionary testing of Android apps
Riyadh Mahmood
,
Nariman Mirzaei
,
S. Malek
SIGSOFT FSE
2014
Corpus ID: 11955443
Proliferation of Android devices and apps has created a demand for applicable automated software testing techniques. Prior…
Expand
Highly Cited
2013
Highly Cited
2013
Permission-Based Android Malware Detection
Zarni Aung
,
W. Zaw
2013
Corpus ID: 1754769
Mobile devices have become popular in our lives since they offer almost the same functionality as personal computers. Among them…
Expand
Highly Cited
2012
Highly Cited
2012
“Andromaly”: a behavioral malware detection framework for android devices
A. Shabtai
,
Uri Kanonov
,
Y. Elovici
,
Chanan Glezer
,
Yael Weiss
Journal of Intelligence and Information Systems
2012
Corpus ID: 6993130
This article presents Andromaly—a framework for detecting malware on Android mobile devices. The proposed framework realizes a…
Expand
Highly Cited
2012
Highly Cited
2012
DroidMat: Android Malware Detection through Manifest and API Calls Tracing
Dong-Jie Wu
,
Ching-Hao Mao
,
Te-En Wei
,
Hahn-Ming Lee
,
Kuo-Ping Wu
Seventh Asia Joint Conference on Information…
2012
Corpus ID: 206511836
Recently, the threat of Android malware is spreading rapidly, especially those repackaged Android malware. Although understanding…
Expand
Highly Cited
2012
Highly Cited
2012
Aurasium: Practical Policy Enforcement for Android Applications
Rubin Xu
,
Hassen Saïdi
,
Ross J. Anderson
USENIX Security Symposium
2012
Corpus ID: 13399324
The increasing popularity of Google's mobile platform Android makes it the prime target of the latest surge in mobile malware…
Expand
Highly Cited
2012
Highly Cited
2012
Systematic Detection of Capability Leaks in Stock Android Smartphones
Michael C. Grace
,
Yajin Zhou
,
Zhi Wang
,
Xuxian Jiang
Network and Distributed System Security Symposium
2012
Corpus ID: 12187296
Recent years have witnessed a meteoric increase in the adoption of smartphones. To manage information and features on such phones…
Expand
Highly Cited
2012
Highly Cited
2012
Dr. Android and Mr. Hide: fine-grained permissions in android applications
Jinseong Jeon
,
Kristopher K. Micinski
,
+4 authors
T. Millstein
Security and Privacy in Smartphones and Mobile…
2012
Corpus ID: 6545669
Google's Android platform includes a permission model that protects access to sensitive capabilities, such as Internet access…
Expand
Highly Cited
2010
Highly Cited
2010
Privilege Escalation Attacks on Android
Lucas Davi
,
A. Dmitrienko
,
A. Sadeghi
,
M. Winandy
Information Security Conference
2010
Corpus ID: 9224109
Android is a modern and popular software platform for smartphones. Among its predominant features is an advanced security model…
Expand
Highly Cited
2010
Highly Cited
2010
An Android Application Sandbox system for suspicious software detection
Thomas Bläsing
,
L. Batyuk
,
Aubrey-Derrick Schmidt
,
S. Çamtepe
,
S. Albayrak
International Conference on Malicious and…
2010
Corpus ID: 8753824
Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of…
Expand
Highly Cited
2009
Highly Cited
2009
SCanDroid: Automated Security Certification of Android
A. P. Fuchs
,
A. Chaudhuri
,
J. Foster
2009
Corpus ID: 110920432
Android is a popular mobile-device platform developed by Google. Android’s application model is designed to encourage…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE