Author:
Asăvoae Irina Măriuca,Nguyen Hoang Nga,Roggenbach Markus
Publisher
Springer International Publishing
Reference35 articles.
1. Android API reference.
https://developer.android.com/reference/classes
. Accessed 01 May 2018
2. Android bytecode.
https://source.android.com/devices/tech/dalvik/dalvik-bytecode
. Accessed 01 May 2018
3. Alam, M.I., Halder, R., Goswami, H., Pinto, J.S.: K-taint: an executable rewriting logic semantics for taint analysis in the k-framework. In: ENASE, pp. 359–366. SciTePress (2018)
4. Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Traon, Y.L., Octeau, D., McDaniel, P.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: PLDI 2014, p. 29. ACM (2014)
5. Asavoae, I.M., Blasco, J., Chen, T.M., Kalutarage, H.K., Muttik, I., Nguyen, H.N., Roggenbach, M., Shaikh, S.A.: Detecting malicious collusion between mobile software applications: the Android$$^{TM}$$TM case. In: Carrascosa, I.P., Kalutarage, H.K., Huang, Y. (eds.) Data Analytics and Decision Support for Cybersecurity. Springer, Cham (2017).
https://doi.org/10.1007/978-3-319-59439-2_3