A Hybrid / Novel Approach To Analyse Vulnerabilities in Software Applications Using Deep Learning Methods
A Hybrid / Novel Approach To Analyse Vulnerabilities in Software Applications Using Deep Learning Methods
Implementation
Altuwaijri, H. and Ghouzali, S., 2020. Android data storage security: A review. Journal of King Saud University-Computer and Information Sciences, 32(5), pp.543-552.
Yuan, H., Tang, Y., Sun, W. and Liu, L., 2020. A detection method for android application security based on TF-IDF and machine learning. Plos one, 15(9), p.e0238694.
Yang, L., Zhi, Y., Wei, T., Yu, S. and Ma, J., 2019. Inference attack in Android Activity based on program fingerprint. Journal of Network and Computer Applications, 127, pp.92-
106.
Almomani, I.M. and Al Khayer, A., 2020. A Comprehensive Analysis of the Android Permissions System. IEEE Access, 8, pp.216671-216688.
Liu, Y., Liu, L., Liu, H., Gao, S. and Song, G., 2020. Recommending Security Requirements for the Development of Android Applications Based on Sensitive APIs. IEEE Access, 8,
pp.101591-101606.
Wang, Y., Xu, G., Liu, X., Mao, W., Si, C., Pedrycz, W. and Wang, W., 2020. Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic
analysis. Journal of Systems and Software, 167, p.110609.
Hammad, M., Bagheri, H. and Malek, S., 2019. DelDroid: an automated approach for determination and enforcement of least-privilege architecture in android. Journal of Systems
and Software, 149, pp.83-100.
Mayrhofer, R., Stoep, J.V., Brubaker, C. and Kralevich, N., 2021. The android platform security model. ACM Transactions on Privacy and Security (TOPS), 24(3), pp.1-35.
Wu, T., Tang, L., Zhang, R., Wen, S., Paris, C., Nepal, S., Grobler, M. and Xiang, Y., 2019. Catering to your concerns: Automatic generation of personalised security-centric
descriptions for android apps. ACM Transactions on Cyber-Physical Systems, 3(4), pp.1-21.
Tang, J., Li, R., Wang, K., Gu, X. and Xu, Z., 2020. A novel hybrid method to analyze security vulnerabilities in android applications. Tsinghua Science and Technology, 25(5),
pp.589-603.
Thank You