DIMDA: deep learning and image-based malware detection for Android

V Sihag, S Prakash, G Choudhary, N Dragoni… - Futuristic Trends in …, 2022 - Springer
With the widespread adoption of handheld smartphones, the number of malware targeting
them has grown dramatically. Because of the widespread use of cell phones, the quantity of …

[PDF][PDF] A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks. Information 2023, 14, 374

P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun… - 2023 - academia.edu
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …

A detector for Android repackaged applications with layout-fingerprint

T Tu, H Zhang, Y Hu, D Cui, X Zhai - Journal of Information Security and …, 2023 - Elsevier
Some existing methods for detecting repackaged apps use layout files to generate a global
layout tree, but this can result in node positions affecting feature accuracy and repeated …

Istiqamah App: A Mobile Application for Sunnah and Hadith reminder using Flutter framework

R Aminuddin, NAMN Khan, MHM Noor… - 2022 IEEE 18th …, 2022 - ieeexplore.ieee.org
Istiqamah App is a mobile application that utilizes the feature of notification to keep
reminding users to perform sunnah activities daily. Besides, it also comes together with …

[PDF][PDF] Android Malware Detection and Familial Classification using Dynamic Features for Imbalanced Dataset

SA Nikale, S Purohit - Eur. Chem. Bull, 2023 - researchgate.net
Mobile phones are one of the widely used communication platforms. It is also a
muchpreferred device to carry out various diverse activities in different sectors such as …

Libra: Library Identification in Obfuscated Android Apps

DA Tomassi, K Nwodo, M Elsabagh - International Conference on …, 2023 - Springer
In the Android apps ecosystem, third-party libraries play a crucial role in providing common
services and features. However, these libraries introduce complex dependencies that can …

Detecting Android Malware by Mining Enhanced System Call Graphs

RA Yunmar, SS Kusumawardani… - … Journal of Computer …, 2024 - research.rug.nl
The persistent threat of malicious applications targeting Android devices has been growing
in numbers and severity. Numerous techniques have been utilized to defend against this …

Haly: Automated evaluation of hardening techniques in Android and iOS apps

ACW Beijnum - 2023 - essay.utwente.nl
Although mobile operating systems employ a variety of features to sandbox and isolate
apps, these are not always sufficient. Because of this, app developers are recommended to …

Hybrid Dynamic Analysis for Android Malware Protected by Anti-Analysis Techniques with DOOLDA

S Lee, Y Shin, M Choi, H Cho, JH Yi - Journal of Internet Technology, 2024 - jit.ndhu.edu.tw
A lot of the recently reported malware is equipped with the anti-analysis techniques (eg, anti-
emulation, anti-debugging, etc.) for preventing from being the analyzed, which can delay …

在Android 惡意程式中定位模擬器檢測的程式碼區段

林永濬 - 2023 - tdr.lib.ntu.edu.tw
惡意程式開發與分析偵測一直都是攻擊方和防禦方的軍備競賽, 主流的分析方法會結合動態與
靜態分析來試圖截長補短. 對於惡意程式開發者而言, 如何去規避分析不讓自己的惡意行為被 …