The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

PIndroid: A novel Android malware detection system using ensemble learning methods

F Idrees, M Rajarajan, M Conti, TM Chen… - Computers & …, 2017 - Elsevier
The extensive use of smartphones has been a major driving force behind a drastic increase
of malware attacks. Covert techniques used by the malware make them hard to detect with …

Monkey says, monkey does: security and privacy on voice assistants

E Alepis, C Patsakis - IEEE Access, 2017 - ieeexplore.ieee.org
The introduction of smart mobile devices has radically redesigned user interaction, as these
devices are equipped with numerous sensors, making applications context-aware. To further …

Detecting android malware leveraging text semantics of network flows

S Wang, Q Yan, Z Chen, B Yang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The emergence of malicious apps poses a serious threat to the Android platform. Most types
of mobile malware rely on network interface to coordinate operations, steal users' private …

DroidNative: Automating and optimizing detection of Android native code malware variants

S Alam, Z Qu, R Riley, Y Chen, V Rastogi - computers & security, 2017 - Elsevier
According to the Symantec and F-Secure threat reports, mobile malware development in
2013 and 2014 has continued to focus almost exclusively (~ 99%) on the Android platform …

Breaking into the vault: Privacy, security and forensic analysis of Android vault applications

X Zhang, I Baggili, F Breitinger - Computers & Security, 2017 - Elsevier
In this work we share the first account for the forensic analysis, security and privacy of
Android vault applications. Vaults are designed to be privacy enhancing as they allow users …

Android resource usage risk assessment using hidden Markov model and online learning

B Rashidi, C Fung, E Bertino - Computers & Security, 2017 - Elsevier
With Android devices users are allowed to install third-party applications from various open
markets. This raises security and privacy concerns since the third-party applications may be …

Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers

Z Abaid, MA Kaafar, S Jha - 2017 IEEE 16th international …, 2017 - ieeexplore.ieee.org
With the proliferation of Android-based devices, malicious apps have increasingly found
their way to user devices. Many solutions for Android malware detection rely on machine …