Detection of repackaged android malware with code-heterogeneity features

K Tian, D Yao, BG Ryder, G Tan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
During repackaging, malware writers statically inject malcode and modify the control flow to
ensure its execution. Repackaged malware is difficult to detect by existing classification …

Towards discovering and understanding task hijacking in android

C Ren, Y Zhang, H Xue, T Wei, P Liu - 24th USENIX Security …, 2015 - usenix.org
Android multitasking provides rich features to enhance user experience and offers great
flexibility for app developers to promote app personalization. However, the security …

Machine learning-based malicious application detection of android

L Wei, W Luo, J Weng, Y Zhong, X Zhang, Z Yan - IEEE Access, 2017 - ieeexplore.ieee.org
In this paper, we propose a machine learning-based approach to detect malicious mobile
malware in Android applications. This paper is able to capture instantaneous attacks that …

Characterizing Android apps' behavior for effective detection of malapps at large scale

X Wang, W Wang, Y He, J Liu, Z Han… - Future generation …, 2017 - Elsevier
Android malicious applications (malapps) have surged and been sophisticated, posing a
great threat to users. How to characterize, understand and detect Android malapps at a large …

Android malware detection through generative adversarial networks

M Amin, B Shah, A Sharif, T Ali, KI Kim… - Transactions on …, 2022 - Wiley Online Library
Mobile and cell devices have empowered end users to tweak their cell phones more than
ever and introduce applications just as we used to with personal computers. Android …

IntDroid: Android malware detection based on API intimacy analysis

D Zou, Y Wu, S Yang, A Chauhan, W Yang… - ACM Transactions on …, 2021 - dl.acm.org
Android, the most popular mobile operating system, has attracted millions of users around
the world. Meanwhile, the number of new Android malware instances has grown …

Mining permission request patterns from android and facebook applications

M Frank, B Dong, AP Felt… - 2012 IEEE 12th …, 2012 - ieeexplore.ieee.org
Android and Facebook provide third-party applications with access to users' private data and
the ability to perform potentially sensitive operations (eg, post to a user's wall or place phone …

Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation)

R Jusoh, A Firdaus, S Anwar, MZ Osman… - PeerJ Computer …, 2021 - peerj.com
Android is a free open-source operating system (OS), which allows an in-depth
understanding of its architecture. Therefore, many manufacturers are utilizing this OS to …

Pin skimming: exploiting the ambient-light sensor in mobile devices

R Spreitzer - Proceedings of the 4th ACM Workshop on Security and …, 2014 - dl.acm.org
The pervasive usage of mobile devices, ie, smartphones and tablet computers, and their
vast amount of sensors represent a plethora of side channels posing a serious threat to the …

A two-layered permission-based android malware detection scheme

X Liu, J Liu - 2014 2nd IEEE international conference on mobile …, 2014 - ieeexplore.ieee.org
Android platform has become the main target of the malware developers in the past few
years. One of Android's main defense mechanisms against malicious apps is a permission …