[PDF][PDF] A Survey of Android Security Threats and Defenses.

B Rashidi, CJ Fung - J. Wirel. Mob. Networks Ubiquitous Comput …, 2015 - isyou.info
With billions of people using smartphones and the exponential growth of smartphone apps,
it is prohibitive for app marketplaces, such as Google App Store, to thoroughly verify if an …

Accurate mobile malware detection and classification in the cloud

X Wang, Y Yang, Y Zeng - SpringerPlus, 2015 - Springer
As the dominator of the Smartphone operating system market, consequently android has
attracted the attention of s malware authors and researcher alike. The number of types of …

GroddDroid: a gorilla for triggering malicious behaviors

A Abraham, R Andriatsimandefitra… - … on malicious and …, 2015 - ieeexplore.ieee.org
Android malware authors use sophisticated techniques to hide the malicious intent of their
applications. They use cryptography or obfuscation techniques to avoid detection during …

[PDF][PDF] Intelligent approach for android malware detection

S Abdulla, A Altaher - KSII Transactions on Internet and Information …, 2015 - koreascience.kr
As the Android operating system has become a key target for malware authors, Android
protection has become a thriving research area. Beside the proved importance of system …

Smart malware detection on Android

L Gheorghe, B Marin, G Gibson… - Security and …, 2015 - Wiley Online Library
Nowadays, because of its increased popularity, Android is target to a growing number of
attacks and malicious applications, with the purpose of stealing private information and …

A study of android malware detection technology evolution

WC Hsieh, CC Wu, YW Kao - 2015 international Carnahan …, 2015 - ieeexplore.ieee.org
According to the report of International Data Corporation (IDC), Android OS has dominated
the worldwide smart phone Operating System (OS) Market with a 78% share at the first …

Proactive restart as cyber maneuver for Android

Z Shan, I Neamtiu, Z Qian… - MILCOM 2015-2015 IEEE …, 2015 - ieeexplore.ieee.org
Moving-target defense is an effective strategy for deflecting cyber attacks. The widespread
use of smartphones in the tactical field requires novel ways of securing smartphones against …

Behavioral and dynamic security functions chaining for android devices

G Hurel, R Badonnel, A Lahmadi… - 2015 11th International …, 2015 - ieeexplore.ieee.org
We present an approach for dynamically outsourcing and composing security functions for
mobile devices, according to the network behavior of their running applications. Applications …

[PDF][PDF] Preventing collusion attack in android.

I Kashefi, M Kassiri, M Salleh - Int. Arab J. Inf. Technol., 2015 - iajit.org
Globally, the number of Smartphone users has risen above a billion, and most of users use
them to do their day-today activities. Therefore, the security of smartphones turns to a great …

Adaptive multi-layer security approach for cyber defense

S Lee, T Kang - Journal of Internet Computing and Services, 2015 - koreascience.kr
As attacks in cyber space become advanced and complex, monotonous defense approach
of one-one matching manner between attack and defense may be limited to defend them …