AA Oluchi, OA Maria, AC Charles… - International …, 2022 - search.proquest.com
Due to innovative advancement, Smart phones developed into in fact and practically refined gadgets called mobile phones. Giving far reaching abilities, Smart phones are getting …
In this paper, recent scholastic research conducted by various groups in the field of mobile malware detection, analysis, and associated forensic techniques are reviewed. Information …
M Guerra, B Taubmann, HP Reiser… - … on Software Quality …, 2018 - ieeexplore.ieee.org
TrustZone is an extension of the ARM architecture that allows software executed in ARM processors to be split in two environments: the normal world that runs a common operating …
Permissions are the cornerstone for Android security model, as they enable secure access to sensitive resources of the phone. Consequently, improper use of Android permission …
Malware detection is one of the most critical features in many real applications, especially for the mobile platform and the Internet of Things (IoT) technology. Due to the proliferation of …
Z Lin, R Wang, X Jia, S Zhang… - 2016 IEEE Trustcom …, 2016 - ieeexplore.ieee.org
Malware, a significant threat to maintain a healthy Android ecosystem, always receives considerable attentions. This paper proposes a new dynamic Android malware classification …
With the prevalence of mobile devices, the security threats are growing in number and seriousness. Among the mobile operating systems, Google's Android has been attacked …