A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions

EM Rudd, A Rozsa, M Günther… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As our professional, social, and financial existences become increasingly digitized and as
our government, healthcare, and military infrastructures rely more on computer technologies …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Spotting the malicious moment: Characterizing malware behavior using dynamic features

A Ferrante, E Medvet, F Mercaldo… - … and Security (ARES), 2016 - ieeexplore.ieee.org
While mobile devices have become more pervasive every day, the interest in them from
attackers has also been increasing, making effective malware detection tools of ultimate …

Detection and visualization of android malware behavior

O Somarriba, U Zurutuza… - Journal of Electrical …, 2016 - Wiley Online Library
Malware analysts still need to manually inspect malware samples that are considered
suspicious by heuristic rules. They dissect software pieces and look for malware evidence in …

Android code protection via obfuscation techniques: past, present and future directions

P Faruki, H Fereidooni, V Laxmi, M Conti… - arXiv preprint arXiv …, 2016 - arxiv.org
Mobile devices have become ubiquitous due to centralization of private user information,
contacts, messages and multiple sensors. Google Android, an open-source mobile …

Dysign: dynamic fingerprinting for the automatic detection of android malware

EMB Karbab, M Debbabi, S Alrabaee… - … on Malicious and …, 2016 - ieeexplore.ieee.org
The astonishing spread of Android OS, not only in smart phones and tablets but also in IoT
devices, makes this operating system a very tempting target for malware threats. Indeed, the …

Hand drawn optical circuit recognition

M Rabbani, R Khoshkangini… - Procedia Computer …, 2016 - Elsevier
Electrical diagram is foundation of studies in electrical science. A circuit diagram convey
many information about the system. Behind any device there are plenty of electrical …

DroidChain: A novel Android malware detection method based on behavior chains

Z Wang, C Li, Z Yuan, Y Guan, Y Xue - Pervasive and Mobile Computing, 2016 - Elsevier
The drastic increase of Android malware has led to strong interest in automating malware
analysis. In this paper, to fight against malware variants and zero-day malware, we …

Native malware detection in smartphones with android OS using static analysis, feature selection and ensemble classifiers

S Morales-Ortega… - … on Malicious and …, 2016 - ieeexplore.ieee.org
The use of Smartphones (SPs) with Android Operating System (AOS) has reached
unprecedented popularity. This is due to the many features that these devices offer as …

Droidanalyst: Synergic app framework for static and dynamic app analysis

P Faruki, S Bhandari, V Laxmi, M Gaur… - Recent Advances in …, 2016 - Springer
Evolution of mobile devices, availability of additional resources coupled with enhanced
functionality has leveraged smartphone to substitute the conventional computing devices …