Stealth attacks: An extended insight into the obfuscation effects on android malware

D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto - Computers & Security, 2015 - Elsevier
In order to effectively evade anti-malware solutions, Android malware authors are
progressively resorting to automatic obfuscation strategies. Recent works have shown, on …

Catch me if you can: Evaluating android anti-malware against transformation attacks

V Rastogi, Y Chen, X Jiang - IEEE Transactions on Information …, 2013 - ieeexplore.ieee.org
Mobile malware threats (eg, on Android) have recently become a real concern. In this paper,
we evaluate the state-of-the-art commercial mobile anti-malware products for Android and …

Droidchameleon: evaluating android anti-malware against transformation attacks

V Rastogi, Y Chen, X Jiang - Proceedings of the 8th ACM SIGSAC …, 2013 - dl.acm.org
Mobile malware threats have recently become a real concern. In this paper, we evaluate the
state-of-the-art commercial mobile antimalware products for Android and test how resistant …

[PDF][PDF] Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis.

A Bacci, A Bartoli, F Martinelli, E Medvet, F Mercaldo… - ICISSP, 2018 - scitepress.org
The huge diffusion of malware in mobile platform is plaguing users. New malware
proliferates at a very fast pace: as a matter of fact, to evade the signature-based mechanism …

Obfuscation techniques against signature-based detection: a case study

G Canfora, A Di Sorbo, F Mercaldo… - 2015 Mobile systems …, 2015 - ieeexplore.ieee.org
Android malware is increasingly growing interms of complexity. In order to evade signature-
based detection, which represents the most adopted technique by current antimalware …

Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology

MD Preda, F Maggi - Journal of Computer Virology and Hacking …, 2017 - Springer
The authors of mobile-malware have started to leverage program protection techniques to
circumvent anti-viruses, or simply hinder reverse engineering. In response to the diffusion of …

Obfuscation-resilient android malware analysis based on complementary features

C Gao, M Cai, S Yin, G Huang, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Existing Android malware detection methods are usually hard to simultaneously resist
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …

The rise of obfuscated Android malware and impacts on detection methods

WF Elsersy, A Feizollah, NB Anuar - PeerJ Computer Science, 2022 - peerj.com
The various application markets are facing an exponential growth of Android malware. Every
day, thousands of new Android malware applications emerge. Android malware hackers …

Divide-and-conquer: Why android malware cannot be stopped

D Maier, T Müller, M Protsenko - 2014 Ninth International …, 2014 - ieeexplore.ieee.org
In this paper, we demonstrate that Android malware can bypass all automated analysis
systems, including AV solutions, mobile sandboxes, and the Google Bouncer. We propose a …

Droidevolver: Self-evolving android malware detection system

K Xu, Y Li, R Deng, K Chen, J Xu - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Given the frequent changes in the Android framework and the continuous evolution of
Android malware, it is challenging to detect malware over time in an effective and scalable …