[PDF][PDF] A study on obfuscation techniques for android malware

M Pomilia - Sapienza University of Rome, 2016 - midlab.diag.uniroma1.it
In the last years more and more often obfuscation techniques are used on malware to evade
the detection of static analysis tools. This problem was already mentioned and studied in …

Stealth attacks: An extended insight into the obfuscation effects on android malware

D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto - Computers & Security, 2015 - Elsevier
In order to effectively evade anti-malware solutions, Android malware authors are
progressively resorting to automatic obfuscation strategies. Recent works have shown, on …

Evaluation of survivability of the automatically obfuscated android malware

H Patel, D Patel, J Ahluwalia, V Kapoor… - Applied Sciences, 2022 - mdpi.com
Featured Application Findings of the paper can be implemented in malware detection
applications. Abstract Malware is a growing threat to all mobile platforms and hundreds of …

[PDF][PDF] Evaluating malwares obfuscation techniques against antimalware detection algorithms

F Mercaldo, CA Visaggio - Technical Report, 2015 - researchgate.net
Everyday more than 1 million new Android devices are activated worldwide. This trend has
decreed Android the most diffuse middleware for mobile platform. Google Play is the premier …

Cybercrime specialization: An exposé of a malicious Android Obfuscation-as-a-Service

V Šembera, M Paquet-Clouston… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Malware authors constantly obfuscate their files and defenders regularly develop new
techniques to detect them. Given this cat-and-mouse game, specialized obfuscation services …

Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology

MD Preda, F Maggi - Journal of Computer Virology and Hacking …, 2017 - Springer
The authors of mobile-malware have started to leverage program protection techniques to
circumvent anti-viruses, or simply hinder reverse engineering. In response to the diffusion of …

Effectiveness of android obfuscation on evading anti-malware

M Chua, V Balachandran - Proceedings of the eighth ACM conference …, 2018 - dl.acm.org
Obfuscation techniques have been conventionally used for legitimate applications, including
preventing application reverse engineering, tampering and protecting intellectual property. A …

DeepMalOb: deep detection of obfuscated android malware

Z Sawadogo, JM Dembele, A Tahar, G Mendy… - Pan-African Artificial …, 2022 - Springer
The detection of malware android became very crucial with the use of obfuscation
techniques by developers of malicious applications. In the literature several approaches …

[PDF][PDF] The Evil Inside a Droid—Android Malware: past, present and future

M Spreitzenbarth - … of the 1st Baltic Conference on …, 2012 - iuk-verbund.uni-rostock.de
It is now well-known that, for various reasons, Android has become the leading OS for
smartphones with more than 50% of worldwide market share within only a few years. This …

A deep camouflage: evaluating android's anti-malware systems robustness against hybridization of obfuscation techniques with injection attacks

K Bakour, HM Ünver, R Ghanem - Arabian Journal for Science and …, 2019 - Springer
The threats facing smartphones have become one of the most dangerous cyberspace
threats; therefore, many solutions have been developed in the commercial or academic …