Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques

M Spreitzenbarth, T Schreck, F Echtler, D Arp… - International Journal of …, 2015 - Springer
Smartphones in general and Android in particular are increasingly shifting into the focus of
cyber criminals. For understanding the threat to security and privacy, it is important for …

Action recognition via local descriptors and holistic features

X Sun, M Chen, A Hauptmann - 2009 IEEE computer society …, 2009 - ieeexplore.ieee.org
In this paper we propose a unified action recognition framework fusing local descriptors and
holistic features. The motivation is that the local descriptors and holistic features emphasize …

Static detection of Android malware by using permissions and API calls

PPK Chan, WK Song - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Android smart phones have become more and more popular due to its increasing
functionalities, compatibility and convenience. More and more Android applications have …

An in-depth analysis of Android malware using hybrid techniques

AT Kabakus, IA Dogru - Digital Investigation, 2018 - Elsevier
Android malware is widespread despite the effort provided by Google in order to prevent it
from the official application market, Play Store. Two techniques namely static and dynamic …

MAMA: manifest analysis for malware detection in android

B Sanz, I Santos, C Laorden… - Cybernetics and …, 2013 - Taylor & Francis
The use of mobile phones has increased because they offer nearly the same functionality as
a personal computer. In addition, the number of applications available for Android-based …

Dna-droid: A real-time android ransomware detection framework

A Gharib, A Ghorbani - Network and System Security: 11th International …, 2017 - Springer
Ransomware has become one of the main cyber-threats for mobile platforms and in
particular for Android. The number of ransomware attacks are increasing exponentially …

Discovering optimal features using static analysis and a genetic search based method for Android malware detection

A Firdaus, NB Anuar, A Karim, MFA Razak - Frontiers of Information …, 2018 - Springer
Mobile device manufacturers are rapidly producing miscellaneous Android versions
worldwide. Simultaneously, cyber criminals are executing malicious actions, such as …

Automated synthesis of semantic malware signatures using maximum satisfiability

Y Feng, O Bastani, R Martins, I Dillig… - arXiv preprint arXiv …, 2016 - arxiv.org
This paper proposes a technique for automatically learning semantic malware signatures for
Android from very few samples of a malware family. The key idea underlying our technique …

Introducing a new dataset for event detection in cybersecurity texts

HMD Trong, DT Le, APB Veyseh… - Proceedings of the …, 2020 - aclanthology.org
Detecting cybersecurity events is necessary to keep us informed about the fast growing
number of such events reported in text. In this work, we focus on the task of event detection …

Toward engineering a secure android ecosystem: A survey of existing techniques

M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng… - ACM Computing …, 2016 - dl.acm.org
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …