M Conti, QQ Li, A Maragno… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
In recent years, mobile devices (eg, smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for …
Dynamic analysis of Android malware suffers from techniques that identify the analysis environment and prevent the malicious behavior from being observed. While there are many …
C Lee, H Han, M Song, J Seo, H Kim… - IEEE Journal of …, 2018 - ieeexplore.ieee.org
Organic phototransistors were fabricated by inserting the patterned layers of a chemically doped conjugated polymer, poly (3, 4-ethylenedioxythiophene)-poly (styrenesulfonate) …
P Vinod, P Viswalakshmi - Arabian Journal for Science and Engineering, 2018 - Springer
The extensive use of smartphones and increased popularity of Android operating system have proliferated in malware attacks. In order to overcome these malicious attacks …
S Kumar, A Viinikainen… - 2018 1st international …, 2018 - ieeexplore.ieee.org
Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to …
M Guerra, B Taubmann, HP Reiser… - … on Software Quality …, 2018 - ieeexplore.ieee.org
TrustZone is an extension of the ARM architecture that allows software executed in ARM processors to be split in two environments: the normal world that runs a common operating …
Permissions are the cornerstone for Android security model, as they enable secure access to sensitive resources of the phone. Consequently, improper use of Android permission …
Mobile devices such as smartphones are becoming the majority of computing devices due to their evolving capabilities. Currently, service providers such as financial and healthcare …