Android OS
iOS Applications (Binary Code)
Android Applications (Decompiled DVM Code)
Android Applications (DVM Code)
- TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. Mc- Daniel, and A. N. Sheth. OSDI, 2010
- Vision: automated security validation of mobile apps at app markets. Peter Gilbert, Byung-Gon Chun, Landon P. Cox, and Jaeyeon Jung. MCS 2011.
- [TR] Automating Privacy Testing of Smartphone Applications. Peter Gilbert, Byung-Gon Chun, Landon P. Cox, and Jaeyeon Jung. Duke University, Technical Report CS-2011-02 []
- Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems, David Barrera, William Enck, and Paul C. van Oorschot. Technical Report TR-11-06
- Android Permissions Demystified, Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, and David Wagner, CCS 2011
- Analyzing Inter-Application Communication in Android, E Chin, AP Felt, K Greenwood, D Wagner, Mobysis 2011
- These Aren't the Droids You're Looking For": Retroffiting Android to Protect Data from Imperious Applications, Peter Hornyack, Seongyeop Han, Jaeyeon Jung, Stuart Schechter, and David Wetherall, no. MSR-TR-2011-71
Android Applications Security (e.g., Permission File)
- A methodology for empirical analysis of permission-based security models and its application to android, D. Barrera, H. Kayacik, P. van Oorschot, and A. Somayaji. CCS 2010
- New Policy Modeling/Enforcement
- Application-Centric Security Policies on Unmodified Android. Nikhilesh Reddy, Jinseong Jeon, Jeffrey A. Vaughan, Todd Millstein, and Jeffrey S. Foster. UCLA Technical Report 110017, July 2011.
- On Lightweight Mobile Phone Application Certification. William Enck, Machigar Ongtang, and Patrick McDaniel. CCS 2009.
- Semantically Rich Application-Centric Security in Android, Machigar Ongtang, Stephen McLaughlin, William Enck, and Patrick McDaniel. ACSAC 2009.
- The Effectiveness of Application Permissions, AP Felt, K Greenwood, D Wagner, USENIX WebApps 2011
- A methodology for empirical analysis of permission-based security models and its application to android, D. Barrera, H. Kayacik, P. van Oorschot, and A. Somayaji. CCS 2010
TouchDevelop Script
Categorized By Output Type
Privacy or Security Leakage
- A Study of Android Application Security, William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. USENIX Security 2011.
- TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. Mc- Daniel, and A. N. Sheth. OSDI, 2010
- Vision: automated security validation of mobile apps at app markets. Peter Gilbert, Byung-Gon Chun, Landon P. Cox, and Jaeyeon Jung. MCS 2011.
- [TR] Automating Privacy Testing of Smartphone Applications. Peter Gilbert, Byung-Gon Chun, Landon P. Cox, and Jaeyeon Jung. Duke University, Technical Report CS-2011-02
- PiOS: Detecting Privacy Leaks in iOS Applications, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna. NDSS 201
- Transparent Privacy Control via Static Information Flow Analysis, Xusheng Xiao, Nikolai Tillmann, Manuel Fahndrich, Peli de Halleux, and Michal Moskal, no. MSR-TR-2011-93.
- Analyzing Inter-Application Communication in Android, E Chin, AP Felt, K Greenwood, D Wagner, Mobysis 2011
Detecting Changes in Behavior
Overprivileges of Access
Rule Violation (e.g., Dangerous Permission)
Mocked Permission
Visualization
Categorized By Analysis and Testing Type
Design new Architecture
Policy Modeling and Enforcement
- Application-Centric Security Policies on Unmodified Android. Nikhilesh Reddy, Jinseong Jeon, Jeffrey A. Vaughan, Todd Millstein, and Jeffrey S. Foster. UCLA Technical Report 110017, July 2011.
- On Lightweight Mobile Phone Application Certification. William Enck, Machigar Ongtang, and Patrick McDaniel. CCS 2009.
- Semantically Rich Application-Centric Security in Android, Machigar Ongtang, Stephen McLaughlin, William Enck, and Patrick McDaniel. ACSAC 2009.
- These Aren't the Droids You're Looking For": Retroffiting Android to Protect Data from Imperious Applications, Peter Hornyack, Seongyeop Han, Jaeyeon Jung, Stuart Schechter, and David Wetherall, no. MSR-TR-2011-71
Empirical Analysis or Case Study
Test Generation
Dynamic Taint Analysis
Static Analysis
- A Study of Android Application Security, William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. USENIX Security 2011.
- PiOS: Detecting Privacy Leaks in iOS Applications, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna. NDSS 201
- Transparent Privacy Control via Static Information Flow Analysis, Xusheng Xiao, Nikolai Tillmann, Manuel Fahndrich, Peli de Halleux, and Michal Moskal, no. MSR-TR-2011-93.
- Android Permissions Demystified, Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, and David Wagner, CCS 2011
- Analyzing Inter-Application Communication in Android, E Chin, AP Felt, K Greenwood, D Wagner, Mobysis 2011
Mock
Re-engineering
Categorized By AnalysisType
Information flow analysis
API Calls
Control flow analysis
- A Study of Android Application Security, William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. USENIX Security 2011.
- Vision: automated security validation of mobile apps at app markets. Peter Gilbert, Byung-Gon Chun, Landon P. Cox, and Jaeyeon Jung. MCS 2011.
- [TR] Automating Privacy Testing of Smartphone Applications. Peter Gilbert, Byung-Gon Chun, Landon P. Cox, and Jaeyeon Jung. Duke University, Technical Report CS-2011-02
- PiOS: Detecting Privacy Leaks in iOS Applications, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna. NDSS 201
- [Intent Control flow] Analyzing Inter-Application Communication in Android, E Chin, AP Felt, K Greenwood, D Wagner, Mobysis 2011
Data flow analysis
- A Study of Android Application Security, William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. USENIX Security 2011.
- TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. Mc- Daniel, and A. N. Sheth. OSDI, 2010
- PiOS: Detecting Privacy Leaks in iOS Applications, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna. NDSS 201
Structural analysis
Semantic analysis
The papers below are that I did not classify papers below yet
- Securing Android-powered mobile devices using SELinux, A Shabtai, Y Fledel, Y Elovici, Security & Privacy 2010
- Google Android: A Comprehensive Security Assessment, A Shabtai, Y Fledel, U Kanonov, Y Elovici, Security & Privacy 2010
- XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks, Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, TR-2011-04
- Privacy Revelations for Web and Mobile Apps, David Wetherall, David Choffnes, Seungyeop Han, Peter Hornyack, Jaeyeon Jung, Stuart Schechter, and Xiao Wang, HotOS 2010
- I'm Allowing What? Disclosing the authority applications demand of users as a condition of installation, Jennifer Tam, Robert W. Reeder, and Stuart Schechter, no. MSR-TR-2010-54
- Can I Borrow Your Phone? Understanding Concerns When Sharing Mobile Phones, Amy K. Karlson, A.J. Bernheim Brush, and Stuart Schechter, CHI 2009
Functional Testing
Development