![]() ![]() On the other hand, it also brings security risks such as privacy leaks or increased attack surfaces (e.g., by introducing over-privileged permissions) to mobile apps. ![]() On the one hand, it can ease the development of mobile apps. Third-party libraries (TPLs) have been widely used in mobile apps, which play an essential part in the entire Android ecosystem. Table 3 enumerates all the 74 papers and the corresponding publication year, venues, and their tool name if any. 2012 IMC Note that: if a tool is not given the name, we use the first author's name to represent it. 2013 PAM AdDroid 2012 ASIACCS AdRisk 2012 WiSec AdSplit 2012 USENIX Security Bauer et al. 2014 IEEE Software(J) Brahmastra 2014 USENIX Security AFrame 2013 ACSAC SanAdBox 2013 ICC Book et al. 2015 Trustcom AdDetect 2014 ISSNIP APKLancet 2014 ASIACCS COMPAC 2014 CODASPY DECAF 2014 NSDI Duet 2014 WiSec Madfraud 2014 MobiSys NativeGuard 2014 Wisec Moonsamy et al. 2015 ICSE ClickDroid 2015 ARES Kühnel et al. 2016 NDSS Madscope 2015 MobiSys PEDAL 2015 MobiSys Book et al. 2016 NDSS LibCage 2016 ESORICS LibFinder 2016 S&P LibRadar 2016 ICSE-C LibScout 2016 CCS LibSift 2016 APSEC Pluto 2016 NDSS Li et al. ![]() 2018 CANDARW FLEXDROID 2017 NDSS Droid-V 2017 MSR OSSPOLICE 2017 CCS AppLibRec 2017 Internetware Derr et al. 2020 TSE(J) MadDroid 2020 2019 CODASPY LibID 2019 ISSTA RIDDLE 2019 ICSE MadLife 2019 2018 ICPC LibD2 2018 TSE(J) Dong et al. 2020 ICSME LibDetect Analysis 2020 ASE LibHarmo 2020 ESEC/FSE LibDX 2020 SANER LibExtractor 2020 WiSec LibRoad 2020 Mobile Computing (J) Ahasanuzzaman et al. We then go through the remaining papers by reading their abstract, introduction, and conclusion and finally select 74 research papers, which are the main research subjects for the following analysis. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |