Cybercrime specialization: An exposé of a malicious Android Obfuscation-as-a-Service

V Šembera, M Paquet-Clouston… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Malware authors constantly obfuscate their files and defenders regularly develop new
techniques to detect them. Given this cat-and-mouse game, specialized obfuscation services …

Stealth attacks: An extended insight into the obfuscation effects on android malware

D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto - Computers & Security, 2015 - Elsevier
In order to effectively evade anti-malware solutions, Android malware authors are
progressively resorting to automatic obfuscation strategies. Recent works have shown, on …

Effectiveness of android obfuscation on evading anti-malware

M Chua, V Balachandran - Proceedings of the eighth ACM conference …, 2018 - dl.acm.org
Obfuscation techniques have been conventionally used for legitimate applications, including
preventing application reverse engineering, tampering and protecting intellectual property. A …

Abusing android runtime for application obfuscation

P Graux, JF Lalande, P Wilke… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Studying Android obfuscation techniques is an essential task for understanding and
analyzing malicious applications. Obfuscation techniques have already been extensively …

[PDF][PDF] A study on obfuscation techniques for android malware

M Pomilia - Sapienza University of Rome, 2016 - midlab.diag.uniroma1.it
In the last years more and more often obfuscation techniques are used on malware to evade
the detection of static analysis tools. This problem was already mentioned and studied in …

Understanding android obfuscation techniques: A large-scale investigation in the wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu… - Security and privacy in …, 2018 - Springer
Program code is a valuable asset to its owner. Due to the easy-to-reverse nature of Java,
code protection for Android apps is of particular importance. To this end, code obfuscation is …

Obfuscation detection in android applications using deep learning

M Conti, P Vinod, A Vitella - Journal of Information Security and …, 2022 - Elsevier
Malware is often hidden in illegitimately cloned software. Android, with over two billions
active devices, is one of the most affected platforms because code cloning is quite simple …

Aomdroid: detecting obfuscation variants of android malware using transfer learning

Y Jiang, R Li, J Tang, A Davanian, H Yin - … , DC, USA, October 21-23, 2020 …, 2020 - Springer
Android with its large market attracts malware developers. Malware developers employ
obfuscation techniques to bypass malware detection mechanisms. Existing systems cannot …

Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology

MD Preda, F Maggi - Journal of Computer Virology and Hacking …, 2017 - Springer
The authors of mobile-malware have started to leverage program protection techniques to
circumvent anti-viruses, or simply hinder reverse engineering. In response to the diffusion of …

Evaluation of survivability of the automatically obfuscated android malware

H Patel, D Patel, J Ahluwalia, V Kapoor… - Applied Sciences, 2022 - mdpi.com
Featured Application Findings of the paper can be implemented in malware detection
applications. Abstract Malware is a growing threat to all mobile platforms and hundreds of …