Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology

MD Preda, F Maggi - Journal of Computer Virology and Hacking …, 2017 - Springer
The authors of mobile-malware have started to leverage program protection techniques to
circumvent anti-viruses, or simply hinder reverse engineering. In response to the diffusion of …

Stealth attacks: An extended insight into the obfuscation effects on android malware

D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto - Computers & Security, 2015 - Elsevier
In order to effectively evade anti-malware solutions, Android malware authors are
progressively resorting to automatic obfuscation strategies. Recent works have shown, on …

Catch me if you can: Evaluating android anti-malware against transformation attacks

V Rastogi, Y Chen, X Jiang - IEEE Transactions on Information …, 2013 - ieeexplore.ieee.org
Mobile malware threats (eg, on Android) have recently become a real concern. In this paper,
we evaluate the state-of-the-art commercial mobile anti-malware products for Android and …

Effectiveness of android obfuscation on evading anti-malware

M Chua, V Balachandran - Proceedings of the eighth ACM conference …, 2018 - dl.acm.org
Obfuscation techniques have been conventionally used for legitimate applications, including
preventing application reverse engineering, tampering and protecting intellectual property. A …

[PDF][PDF] A study on obfuscation techniques for android malware

M Pomilia - Sapienza University of Rome, 2016 - midlab.diag.uniroma1.it
In the last years more and more often obfuscation techniques are used on malware to evade
the detection of static analysis tools. This problem was already mentioned and studied in …

Droidchameleon: evaluating android anti-malware against transformation attacks

V Rastogi, Y Chen, X Jiang - Proceedings of the 8th ACM SIGSAC …, 2013 - dl.acm.org
Mobile malware threats have recently become a real concern. In this paper, we evaluate the
state-of-the-art commercial mobile antimalware products for Android and test how resistant …

Evaluating analysis tools for android apps: Status quo and robustness against obfuscation

J Hoffmann, T Rytilahti, D Maiorca, M Winandy… - Proceedings of the …, 2016 - dl.acm.org
The recent past has shown that Android smartphones became the most popular target for
malware authors. Malware families offer a variety of features that allow, among the others, to …

Cybercrime specialization: An exposé of a malicious Android Obfuscation-as-a-Service

V Šembera, M Paquet-Clouston… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Malware authors constantly obfuscate their files and defenders regularly develop new
techniques to detect them. Given this cat-and-mouse game, specialized obfuscation services …

A survey of android application and malware hardening

V Sihag, M Vardhan, P Singh - Computer Science Review, 2021 - Elsevier
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …

Android code protection via obfuscation techniques: past, present and future directions

P Faruki, H Fereidooni, V Laxmi, M Conti… - arXiv preprint arXiv …, 2016 - arxiv.org
Mobile devices have become ubiquitous due to centralization of private user information,
contacts, messages and multiple sensors. Google Android, an open-source mobile …