Automated forensic analysis of mobile applications on Android devices
Tài liệu tham khảo
Anglano, 2014, 201
Arzt, 2014, Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
Calzavara, 2016, Horndroid: practical and sound static analysis of android applications by smt solving
Cao, 2015, Edgeminer: Automatically detecting implicit control flow transitions through the android framework
Gordon, 2015, Information flow analysis of android applications in droidsafe
Hafner, 2016
Juan Caballero, 2009, Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering
Li, 2015, String analysis for java and android applications
Li, 2015, Iccta: detecting inter-component privacy leaks in android apps
Li, 2017, Static analysis of android apps: a systematic literature review, Inf. Software Technol., 88, 10.1016/j.infsof.2017.04.001
Octeau, 2013, Effective inter-component communication mapping in android with epicc: an essential step towards holistic security analysis
Octeau, 2015, Composite constant propagation: application to android inter-component communication analysis
Sali, K. The Cell Phone Evidence in Adnan Syeds Case Illustrates a Depressingly Common Problem. URL https://www.huffingtonpost.com/kevin-sali/the-cell-phone-evidence-in-adnan-syeds-case_b_9202422.html.
Scrivens, 2017, Android digital forensics: data, extraction and analysis
Wei, 2014, Amandroid: a precise and general inter-component data flow analysis framework for security vetting of android apps
Wikipedia, 2015
Wikipedia, Taint checking. URL https://en.wikipedia.org/wiki/Taint_checking.
Wikipedia. URL https://en.wikipedia.org/wiki/Use-define_chain.
Yang, 2015, Static control-flow analysis of user-driven callbacks in android applications