[HTML][HTML] A survey and evaluation of android-based malware evasion techniques and detection frameworks

P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun… - Information, 2023 - mdpi.com
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …

Systematic Review: Anti-Forensic Computer Techniques

R González Arias, J Bermejo Higuera… - Applied Sciences, 2024 - mdpi.com
The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder
the investigation of a computer atack by eliminating traces and preventing the collection of …

Security of IoT device: perspective forensic/anti-forensic issues on invalid area of NAND flash memory

NY Ahn, DH Lee - IEEE Access, 2022 - ieeexplore.ieee.org
NAND flash memory-based IoT device can potentially still leave behind original personal
data in an invalid area even if the data has been deleted. In this paper, we raise the forensic …

IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances

NY Ahn, DH Lee - Computers & Security, 2023 - Elsevier
NAND flash memory-based IoT devices inherently suffer from data retention issues. In IoT
security, these retention issues are significant and require a robust solution for secure …

Experimental evaluation of e. MMC data recovery

A Fukami, S Sheremetov, F Regazzoni… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
In this paper, we explore the data recovery procedures from MMCs. The MMC is one of the
“managed” flash memory devices that are popularly used in modern digital devices as their …

New diagnostic forensic protocol for damaged secure digital memory cards

F Thomas-Brans, T Heckmann, K Markantonakis… - IEEE …, 2022 - ieeexplore.ieee.org
Over the past twenty years, Secure Digital memory cards have become the most popular
digital storage media. Therefore, forensic experts need to develop forensic techniques to …

Forensic issues and techniques to improve security in SSD with flex capacity feature

NY Ahn, DH Lee - IEEE Access, 2021 - ieeexplore.ieee.org
Over-provisioning technology is typically introduced as a means to improve the performance
of storage systems, such as databases. The over-provisioning area is both hidden and …

Faux Insider Hazard Investigation on Non-Public Cloud Computing by Using ADAM's Technique

DK Wibowo, A Luthfi, Y Prayudi… - … (Rekayasa Sistem dan …, 2022 - jurnal.iaii.or.id
Cloud computing is a service system mechanism that businesses and organizations use to
perform computerized and integrated transactions over computer networks. The service …

[PDF][PDF] A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks. Information 2023, 14, 374

P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun… - 2023 - academia.edu
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …

Investigation of Fake Insider Threats on Private Cloud Computing Services

DK Wibowo, A Luthfi, N Widiyasono - International Journal of …, 2022 - ijstm.inarah.co.id
Cloud-based services are service system mechanisms used by companies or organizations
in conducting computerized and integrated transactions in a computer network. A service …