Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence

L Caviglione, M Gaggero, JF Lalande… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Modern malware uses advanced techniques to hide from static and dynamic analysis tools.
To achieve stealthiness when attacking a mobile device, an effective approach is the use of …

Information hiding as a challenge for malware detection

W Mazurczyk, L Caviglione - arXiv preprint arXiv:1504.04867, 2015 - arxiv.org
Information Hiding as a Challenge for Malware Detection Page 1 Information Hiding as a
Challenge for Malware Detection Wojciech Mazurczyk | Warsaw University of Technology …

A new sensors‐based covert channel on android

A Al-Haiqi, M Ismail, R Nordin - The Scientific World Journal, 2014 - Wiley Online Library
Covert channels are not new in computing systems, and have been studied since their first
definition four decades ago. New platforms invoke thorough investigations to assess their …

Mobile malware detection based on energy fingerprints—a dead end?

J Hoffmann, S Neumann, T Holz - … Symposium, RAID 2013, Rodney Bay, St …, 2013 - Springer
With the ever rising amount and quality of malicious software for mobile phones, multiple
ways to detect such threats are desirable. Next to classical approaches such as dynamic …

Hiding privacy leaks in android applications using low-attention raising covert channels

JF Lalande, S Wendzel - 2013 international conference on …, 2013 - ieeexplore.ieee.org
Covert channels enable a policy-breaking communication not foreseen by a system's
design. Recently, covert channels in Android were presented and it was shown that these …

[PDF][PDF] Drebin: Effective and explainable detection of android malware in your pocket.

D Arp, M Spreitzenbarth, M Hubner, H Gascon… - Ndss, 2014 - media.telefonicatech.com
Malicious applications pose a threat to the security of the Android platform. The growing
amount and diversity of these applications render conventional defenses largely ineffective …

Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

Evolution, detection and analysis of malware for smart devices

G Suarez-Tangil, JE Tapiador… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Smart devices equipped with powerful sensing, computing and networking capabilities have
proliferated lately, ranging from popular smartphones and tablets to Internet appliances …

Detecting android malware leveraging text semantics of network flows

S Wang, Q Yan, Z Chen, B Yang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The emergence of malicious apps poses a serious threat to the Android platform. Most types
of mobile malware rely on network interface to coordinate operations, steal users' private …

Towards a systematic study of the covert channel attacks in smartphones

S Chandra, Z Lin, A Kundu, L Khan - … , Revised Selected Papers, Part I 10, 2015 - Springer
Recently, there is a great attention on the smartphones security and privacy due to their
increasing number of users and wide range of apps. Mobile operating systems such as …