Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,614,843 papers from all fields of science
Search
Sign In
Create Free Account
Android
Known as:
Android system
, Android 3.0 Honeycomb
, Android mobile phone
Expand
Android is a mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
50 relations
ASUS MeMO Pad HD 7
Agent.BTZ
Android Gingerbread
BOINC
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps
Steven Arzt
,
Siegfried Rasthofer
,
+6 authors
P. Mcdaniel
PLDI
2014
Corpus ID: 12083354
Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smartphone users are plagued by…
Expand
Highly Cited
2012
Highly Cited
2012
Dissecting Android Malware: Characterization and Evolution
Yajin Zhou
,
Xuxian Jiang
IEEE Symposium on Security and Privacy
2012
Corpus ID: 206578712
The popularity and adoption of smart phones has greatly stimulated the spread of mobile malware, especially on the popular…
Expand
Review
2012
Review
2012
Android permissions: user attention, comprehension, and behavior
A. Felt
,
Elizabeth Ha
,
Serge Egelman
,
Ariel Haney
,
Erika Chin
,
D. Wagner
SOUPS
2012
Corpus ID: 1847126
Android's permission system is intended to inform users about the risks of installing applications. When a user installs an…
Expand
Highly Cited
2012
Highly Cited
2012
PScout: analyzing the Android permission specification
K. Au
,
Yi Fan Zhou
,
Zhen Huang
,
D. Lie
CCS
2012
Corpus ID: 3401975
Modern smartphone operating systems (OSs) have been developed with a greater emphasis on security and protecting privacy. One of…
Expand
Review
2012
Review
2012
Why eve and mallory love android: an analysis of android SSL (in)security
S. Fahl
,
M. Harbach
,
T. Muders
,
Matthew Smith
,
Lars Baumgärtner
,
B. Freisleben
CCS
2012
Corpus ID: 207198722
Many Android apps have a legitimate need to communicate over the Internet and are then responsible for protecting potentially…
Expand
Highly Cited
2011
Highly Cited
2011
Android permissions demystified
A. Felt
,
Erika Chin
,
Steve Hanna
,
D. Song
,
D. Wagner
CCS '11
2011
Corpus ID: 895039
Android provides third-party applications with an extensive API that includes access to phone hardware, settings, and user data…
Expand
Highly Cited
2011
Highly Cited
2011
A Study of Android Application Security
William Enck
,
Damien Octeau
,
P. Mcdaniel
,
Swarat Chaudhuri
USENIX Security Symposium
2011
Corpus ID: 40095
The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular…
Expand
Review
2011
Review
2011
Analyzing inter-application communication in Android
Erika Chin
,
A. Felt
,
K. Greenwood
,
D. Wagner
MobiSys '11
2011
Corpus ID: 2048672
Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an…
Expand
Highly Cited
2011
Highly Cited
2011
Crowdroid: behavior-based malware detection system for Android
Iker Burguera
,
Urko Zurutuza
,
S. Nadjm-Tehrani
SPSM '11
2011
Corpus ID: 4430630
The sharp increase in the number of smartphones on the market, with the Android platform posed to becoming a market leader makes…
Expand
Highly Cited
2009
Highly Cited
2009
Understanding Android Security
William Enck
,
Machigar Ongtang
,
P. Mcdaniel
IEEE Security & Privacy Magazine
2009
Corpus ID: 9270162
Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE