Abstract-The packaging model of Android apps requires the entire code necessary for the execution of an app to be shipped into one single apk file. Thus, an analysis of Android apps often visits code which is not part of the functionality delivered by the app. Such code is often contributed by the common libraries which are used pervasively by all apps. Unfortunately, Android analyses, e.g., for piggybacking detection and malware detection, can produce inaccurate results if they do not take into account the case of library code, which constitute noise in app features. Despite some efforts on investigating Android libraries, the momentum of Android research has not yet produced a complete set of common libraries to further support in-depth a...
Fingerprinting of browsers has been thoroughly investigated. In contrast, mobile phone applications ...
Software libraries, encapsulating functionality behind a clearly defined interface, are a key compon...
The fluidity of application markets complicate smart-phone security. Although recent efforts have sh...
peer reviewedThe packaging model of Android apps requires the entire code necessary for the executio...
In the recent years, studies of design and programming prac-tices in mobile development are gaining ...
With Android activations reaching a million devices per day, it is of no surprise that security thre...
Every day, developers add new applications (apps) to the Google Play Store, which ease users' lives ...
In the Android ecosystem today, code is often reused by developers in the form of software libraries...
Abstract One of the most popular ways to monetize a free app is by including ad-vertisements in the ...
Android apps use Third-party Libraries (3PLs) such as advertisement, social-networking and analytics...
Mobile apps (or apps) are software applications developed to run on mobile devices such as smartphon...
This work investigates privacy characteristics of Android advertising libraries. Taking a sample of...
Expecting the shipment of 1 billion Android devices in 2017, cyber criminals have naturally extended...
To enable app interoperability, the Android platform exposes installed application methods (IAMs), i...
Over the past few years, concerns have been raised with respect to the increasing number of maliciou...
Fingerprinting of browsers has been thoroughly investigated. In contrast, mobile phone applications ...
Software libraries, encapsulating functionality behind a clearly defined interface, are a key compon...
The fluidity of application markets complicate smart-phone security. Although recent efforts have sh...
peer reviewedThe packaging model of Android apps requires the entire code necessary for the executio...
In the recent years, studies of design and programming prac-tices in mobile development are gaining ...
With Android activations reaching a million devices per day, it is of no surprise that security thre...
Every day, developers add new applications (apps) to the Google Play Store, which ease users' lives ...
In the Android ecosystem today, code is often reused by developers in the form of software libraries...
Abstract One of the most popular ways to monetize a free app is by including ad-vertisements in the ...
Android apps use Third-party Libraries (3PLs) such as advertisement, social-networking and analytics...
Mobile apps (or apps) are software applications developed to run on mobile devices such as smartphon...
This work investigates privacy characteristics of Android advertising libraries. Taking a sample of...
Expecting the shipment of 1 billion Android devices in 2017, cyber criminals have naturally extended...
To enable app interoperability, the Android platform exposes installed application methods (IAMs), i...
Over the past few years, concerns have been raised with respect to the increasing number of maliciou...
Fingerprinting of browsers has been thoroughly investigated. In contrast, mobile phone applications ...
Software libraries, encapsulating functionality behind a clearly defined interface, are a key compon...
The fluidity of application markets complicate smart-phone security. Although recent efforts have sh...