A network-based framework for mobile threat detection

S Kumar, A Viinikainen… - 2018 1st international …, 2018 - ieeexplore.ieee.org
Mobile malware attacks increased three folds in the past few years and continued to expand
with the growing number of mobile users. Adversary uses a variety of evasion techniques to …

Design and Implementation of a Malware Detection System On Smartphones

AA Oluchi, OA Maria, AC Charles… - International …, 2022 - search.proquest.com
Due to innovative advancement, Smart phones developed into in fact and practically refined
gadgets called mobile phones. Giving far reaching abilities, Smart phones are getting …

Mobile malware forensic review: Issues and challenges

AM Alashjaee, N Almolhis, M Haney - … in Security, Networks, and Internet of …, 2021 - Springer
In this paper, recent scholastic research conducted by various groups in the field of mobile
malware detection, analysis, and associated forensic techniques are reviewed. Information …

[PDF][PDF] 移动设备网络流量分析技术综述

徐明, 杨雪, 章坚武 - 电信科学, 2018 - seclab.hdu.edu.cn
移动设备在人们的日常生活中不可或缺, 分析移动设备产生的网络流量能够为网络管理,
隐私保护等活动提供有价值的信息. 为深入了解流量分析在移动设备领域的发展现状及趋势 …

Introspection for ARM TrustZone with the ITZ Library

M Guerra, B Taubmann, HP Reiser… - … on Software Quality …, 2018 - ieeexplore.ieee.org
TrustZone is an extension of the ARM architecture that allows software executed in ARM
processors to be split in two environments: the normal world that runs a common operating …

[图书][B] Efficient permission-aware analysis of android apps

A Sadeghi - 2018 - search.proquest.com
Permissions are the cornerstone for Android security model, as they enable secure access
to sensitive resources of the phone. Consequently, improper use of Android permission …

Malware detection using system logs

NT Nguyen, TT Pham, TX Dang, MS Dao… - Proceedings of the …, 2020 - dl.acm.org
Malware detection is one of the most critical features in many real applications, especially for
the mobile platform and the Internet of Things (IoT) technology. Due to the proliferation of …

[引用][C] 综合短信和HTTP 协议C&C 信道的移动僵尸网络设计

王晓飞, 张大方, 苏欣 - 小型微型计算机系统, 2014

Classifying android malware with dynamic behavior dependency graphs

Z Lin, R Wang, X Jia, S Zhang… - 2016 IEEE Trustcom …, 2016 - ieeexplore.ieee.org
Malware, a significant threat to maintain a healthy Android ecosystem, always receives
considerable attentions. This paper proposes a new dynamic Android malware classification …

Comparative evaluation of ensemble learning and supervised learning in android malwares using network-based analysis

A Feizollah, NB Anuar, R Salleh, F Amalina - Advanced Computer and …, 2015 - Springer
With the prevalence of mobile devices, the security threats are growing in number and
seriousness. Among the mobile operating systems, Google's Android has been attacked …