References
- E. Chin, A.P. Felt, K. Greenwood, and D. Wagner, "Analyzing Inter-Application Communication in Android," Proceeding of the International Conference on Mobile Systems, Applications, and Services, Mobisys, pp. 239-252, 2011.
- COVERT, http://www.ics.uci.edu/-seal/projects/covert/ (Accessed 15 September 2016).
- S. Bugiel, L. Davi, R. Dmitrienko, and T. Fischer, "Towards Taming Privilege-Escalation Attacks on Android," Proceeding of the Annual Network and Distributed System Security Symposium, 2012. (No Page Info)
- L. Li, A. Bartel, J. Klein, Y. L. Traon, and S. Arzt, et al. "I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis," No. ISBN: 978-2-87971-129-4, 2014.
- S. Rasthofer, S. Arzt, E. Lovat, and E. Bodden, "DroidForce Enforcing Complex, Data-Centric, System-Wide Policies in Android," Proceeding of the International Conference on Availability, Reliability, and Security, pp. 8-12, 2014.
- D. Octeau, D. Luchaup, M. Dering, S. Jha, and P. McDaniel, "Composite Constant Propagation: Application to Android Inter-Component Communication Analysis," Proceeding of the International Conference on Software Engineering, pp. 77-88, 2015.
-
Android. App
$\mid$ Android Developers, http://developer.android.com/reference/android/app/package-summary.html (Accessed 10 September 2012). - SuSi, https://github.com/secure-softwareengineering/SuSi (Accessed 10 September 2012).
- Q. Ismail, T. Ahmed, A. Kapadia and M.K. Reiter, "Crowdsourced Exploration of Security Configurations," Proceeding of Annual ACM Conference on Human Factors in Computing Systems, pp. 467-476, 2015.
- DroidBench-Benchmarks, https://github.com/secure-software-engineering/DroidBench (Accessed 10 September 2012).
- F-droid, https://f-droid.org/ (Accessed 10 September 2012).
- Google Play, http://play.google.com/store/apps/ (Accessed 10 September 2012).
- Y. Zhou and X. Jiang, "Dissecting Android Malware Characterization and Evolution," Proceeding of the IEEE Symposium on Security and Privacy, pp. 22-23, 2012.
-
Logcat
$\mid$ Android Developers, http://developer.android.com/tools/help/logcat.html (Accessed 10 September 2012). - So Many Apps, So Much More Time for Entertainment, http://www.nielsen.com/us/en/insights/news/2015/so-many-apps-somuch-more-time-for-entertainment.html (Accessed 10 September 2012).
- H. Kim and J.Choi, "Research on Secure Coding and Weakness for Implementation of Android-based Dynamic Class Loading," Journal of Korea Multimedia Society, pp. 1792-1807, 2016.
- H. Hao, V. Singh, and W. Du, "On the Effectiveness of API-Level Access Control Using Bytecode Rewriting in Android," Proceeding of the Symposium on Information, Computer and Communications Security, pp. 25-36, 2013.