remove doplon in figure/tab/section reference

This commit is contained in:
Jean-Marie Mineau 2025-06-24 12:32:02 +02:00
parent d730d1f4a7
commit 6d9096e314
Signed by: histausse
GPG key ID: B66AEEDA9B645AD2
4 changed files with 26 additions and 25 deletions

View file

@ -5,7 +5,7 @@
Android is the most used mobile operating system since 2014, and since 2017, it even surpasses Windows all platforms combined#footnote[https://gs.statcounter.com/os-market-share#monthly-200901-202304].
The public adoption of Android is confirmed by application developers, with 1.3 millions apps available in the Google Play Store in 2014, and 3.5 millions apps available in 2017#footnote[https://www.statista.com/statistics/266210].
Its popularity makes Android a prime target for malware developers. // For example, various applications have been shown to steal personal information~\cite{shanSelfhidingBehaviorAndroid2018}.
Its popularity makes Android a prime target for malware developers. // For example, various applications have been shown to steal personal information@shanSelfhidingBehaviorAndroid2018.
Consequently, Android has also been an important subject for security research.
In the past fifteen years, the research community released many tools to detect or analyze malicious behaviors in applications. Two main approaches can be distinguished: static and dynamic analysis@Li2017.
Dynamic analysis requires to run the application in a controlled environment to observe runtime values and/or interactions with the operating system.
@ -46,10 +46,10 @@ As a summary, the contributions of this paper are the following:
*/
The paper is structured as follows.
Section@sec:rasta-soa presents a summary of previous works dedicated to Android static analysis tools.
Section@sec:rasta-methodology presents the methodology employed to build our evaluation process and Section@sec:rasta-xp gives the associated experimental results.
// Section@sec:rasta-discussion investigates the reasons behind the observed failures of some of the tools.
Section@sec:rasta-discussion discusses the limitations of this work and gives some takeaways for future contributions.
Section@sec:rasta-conclusion concludes the paper.
@sec:rasta-soa presents a summary of previous works dedicated to Android static analysis tools.
@sec:rasta-methodology presents the methodology employed to build our evaluation process and @sec:rasta-xp gives the associated experimental results.
// @sec:rasta-discussion investigates the reasons behind the observed failures of some of the tools.
@sec:rasta-discussion discusses the limitations of this work and gives some takeaways for future contributions.
@sec:rasta-conclusion concludes the paper.