[HTML][HTML] The rise of obfuscated Android malware and impacts on detection methods

WF Elsersy, A Feizollah, NB Anuar - PeerJ Computer Science, 2022 - peerj.com
The various application markets are facing an exponential growth of Android malware. Every
day, thousands of new Android malware applications emerge. Android malware hackers …

Detection approaches for android malware: Taxonomy and review analysis

HHR Manzil, SM Naik - Expert Systems with Applications, 2023 - Elsevier
The main objective of this review is to present an in-depth study of Android malware
detection approaches. This article provides a comprehensive survey of 150 studies on …

[PDF][PDF] De-LADY: Deep learning based Android malware detection using Dynamic features.

V Sihag, M Vardhan, P Singh, G Choudhary… - J. Internet Serv. Inf …, 2021 - jisis.org
Popularity and market share of Android operating system has given significant rise to
malicious apps targeting it. Traditional malware detection methods are obsolete as current …

Smartphone Security Hardening: Threats to Organizational Security and Risk Mitigation

A Ali, NA Somroo, U Farooq, M Asif… - … on Cyber Resilience …, 2022 - ieeexplore.ieee.org
This article aims to identify some of the most significant security risks an organization may
face if it does not consider the inherent risks associated with personal devices in the …

[HTML][HTML] An optimized and efficient android malware detection framework for future sustainable computing

SK Smmarwar, GP Gupta, S Kumar, P Kumar - … Energy Technologies and …, 2022 - Elsevier
Android-based smart devices cater to services in almost every aspect of our lives like
personal, professional, social, banking, business, etc. However, people with increasingly …

BLADE: Robust malware detection against obfuscation in android

V Sihag, M Vardhan, P Singh - Forensic Science International: Digital …, 2021 - Elsevier
Android OS popularity has given significant rise to malicious apps targeting it. Malware use
state of the art obfuscation methods to hide their functionality and evade anti-malware …

Deep multi-task learning for malware image classification

A Bensaoud, J Kalita - Journal of Information Security and Applications, 2022 - Elsevier
Malicious software is a pernicious global problem. A novel multi-task learning framework is
proposed in this paper for malware image classification for accurate and fast malware …

[HTML][HTML] A crypto-steganography approach for hiding ransomware within HEVC streams in android IoT devices

I Almomani, A Alkhayer, W El-Shafai - Sensors, 2022 - mdpi.com
Steganography is a vital security approach that hides any secret content within ordinary
data, such as multimedia. This hiding aims to achieve the confidentiality of the IoT secret …

[HTML][HTML] PToPI: A comprehensive review, analysis, and knowledge representation of binary classification performance measures/metrics

G Canbek, T Taskaya Temizel, S Sagiroglu - SN Computer Science, 2022 - Springer
Although few performance evaluation instruments have been used conventionally in
different machine learning-based classification problem domains, there are numerous ones …

Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits

K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …