apps adhered to the GAEN API’s recommended us-
age. However, we found failings in tested versions of
some apps that could impact user safety or security,
namely Covid-Safe-Paths, which failed to adhere to
design practices that minimise user risk, Apturi Covid
and Stopp Corona, which failed to correctly inform
users of the status of the GAEN client. For future
work, we mention that MonSTER’s generation of call
flow expressions from an app’s bytecode could be im-
proved to capture more programming constructs, such
as coroutines.
ACKNOWLEDGEMENTS
We are grateful for support for this work from the Of-
fice of Naval Research ONR NICOP award N62909-
17-1-2065 and The Alan Turing Institute under the
EPSRC grant EP/N510129/1.
REFERENCES
Abraham, A., Schlecht, D., Dobrushin, M., and Nadal, V.
(2016). Mobile Security Framework (MobSF). https:
//github.com/MobSF.
Amnesty (2020). Bahrain, Kuwait and Norway Contact
Tracing Apps among Most Dangerous for Pri-
vacy. https://www.amnesty.org/en/latest/news/2020/
06/bahrain-kuwait-norway-contact-tracing-apps-
danger-for-privacy/. Accessed: 2020-08-04.
Anomali (2020). Anomali Threat Research Identifies Fake
COVID-19 Contact Tracing Apps Used to Download
Malware that Monitors Devices, Steals Personal Data.
https://www.anomali.com/blog. Accessed: 2020-09-
10.
Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A.,
Klein, J., Le Traon, Y., Octeau, D., and McDaniel,
P. (2014). Flowdroid: Precise Context, Flow, Field,
Object-Sensitive and Lifecycle-Aware Taint Analysis
for Android Apps. Acm Sigplan Notices, 49(6):259–
269.
Ayewah, N., Pugh, W., Hovemeyer, D., Morgenthaler, J. D.,
and Penix, J. (2008). Using Static Analysis to Find
Bugs. IEEE software, 25(5):22–29.
Bortolozzo, M., Centenaro, M., Focardi, R., and Steel, G.
(2010). Attacking and Fixing PKCS#11 Security To-
kens. pages 260–269.
Cho, H., Ippolito, D., and Yu, Y. W. (2020). Contact Tracing
Mobile Apps for COVID-19: Privacy Considerations
and Related Trade-offs.
Desnos, A. et al. (2015). Androguard. https://github.com/
androguard/androguard.
ESET (2020). New Ransomware Posing as
COVID-19 Tracing App Targets Canada.
https://www.welivesecurity.com/2020/06/24/. Ac-
cessed: 2020-09-10.
Google (2020). Exposure Notifications:
Android API Documentation. https:
//web.archive.org/web/20200603200341/
https://static.googleusercontent.com/media/
www.google.com/en//covid19/exposurenotifications/
pdfs/Android-Exposure-Notification-API-
documentation-v1.3.2.pdf. Accessed: 2020-08-
04.
Gvili, Y. (2020). Security analysis of the covid-19 contact
tracing specifications by apple inc. and google inc.
Leith, D. J. and Farrell, S. (2020). Coronavirus Contact
Tracing: Evaluating the Potential of using Bluetooth
Received Signal Strength For Proximity Detection.
Li, L., Bissyand
´
e, T. F., Papadakis, M., Rasthofer, S., Bar-
tel, A., Octeau, D., Klein, J., and Traon, L. (2017).
Static Analysis of Android Apps: A Systematic Liter-
ature Review. Information and Software Technology,
88:67–95.
LinkedIn (2015). Quick Android Review Kit (QARK).
https://github.com/linkedin/qark.
Magklaras, G. and Bojorquez, L. N. L. (2020). A Re-
view of Information Security Aspects of the Emerg-
ing COVID-19 Contact Tracing Mobile Phone Appli-
cations.
Sadowski, C., Aftandilian, E., Eagle, A., Miller-Cushon, L.,
and Jaspan, C. (2018). Lessons from Building Static
Analysis Tools at Google. Communications of the
ACM, 61(4):58–66.
Samhi, J., Allix, K., Bissyand
´
e, T. F., and Klein, J. (2020).
A First Look at Android Applications in Google Play
related to Covid-19.
TCN (2020). TCN coalition. https://www.covid19.nhs.uk/.
Troncoso, C., Payer, M., Hubaux, J.-P., Salath
´
e, M.,
Larus, J., Bugnion, E., Lueks, W., Stadler, T., Pyrge-
lis, A., Antonioli, D., et al. (2020). Decentralized
Privacy-Preserving Proximity Tracing. arXiv preprint
arXiv:2005.12273.
Vidas, T., Christin, N., and Cranor, L. (2011). Curbing An-
droid Permission Creep. In Proceedings of the Web,
volume 2, pages 91–96.
Wan, Z. and Liu, X. (2020). ContactChaser: A Simple yet
Effective Contact Tracing Scheme with Strong Pri-
vacy. Cryptology ePrint Archive, Report 2020/630.
https://eprint.iacr.org/2020/630.
Wu, D.-J., Mao, C.-H., Wei, T.-E., Lee, H.-M., and Wu,
K.-P. (2012). Droidmat: Android Malware Detection
through Manifest and API Calls Tracing. In 2012 Sev-
enth Asia Joint Conference on Information Security,
pages 62–69. IEEE.
Zheng, M., Sun, M., and Lui, J. C. (2014). DroidTrace: A
Ptrace Based Android Dynamic Analysis System with
Forward Execution Capability. In 2014 international
wireless communications and mobile computing con-
ference (IWCMC), pages 128–133. IEEE.