2020
DOI: 10.3390/app10238351
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Colluding Inter-App Communication in Mobile Environment

Abstract: The increase in computing capabilities of mobile devices has, in the last few years, made possible a plethora of complex operations performed from smartphones and tablets end users, for instance, from a bank transfer to the full management of home automation. Clearly, in this context, the detection of malicious applications is a critical and challenging task, especially considering that the user is often totally unaware of the behavior of the applications installed on their device. In this paper, we propose a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 45 publications
0
2
0
Order By: Relevance
“…Moreover, Alde analyses gives insight into what private information can be leaked by apps that use the same analytics library. Casolare et al [34] also focused on the Android environment by proposing a model checking-based approach for detecting colluding between Android applications. A comparison of existing techniques is given in Table 1.…”
Section: Malware Detection Using Other Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, Alde analyses gives insight into what private information can be leaked by apps that use the same analytics library. Casolare et al [34] also focused on the Android environment by proposing a model checking-based approach for detecting colluding between Android applications. A comparison of existing techniques is given in Table 1.…”
Section: Malware Detection Using Other Techniquesmentioning
confidence: 99%
“…R. Casolare et al [34] Static approach, based on formal methods, which exploit the model checking technique. Limitations of method is that the generation of the first heuristic is not automatic.…”
Section: Malware Detection Using Other Techniquesmentioning
confidence: 99%