Droidcat: Effective android malware detection and categorization via app-level profiling

H Cai, N Meng, B Ryder, D Yao - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Most existing Android malware detection and categorization techniques are static
approaches, which suffer from evasion attacks, such as obfuscation. By analyzing program …

Understanding android obfuscation techniques: A large-scale investigation in the wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu… - Security and Privacy in …, 2018 - Springer
Program code is a valuable asset to its owner. Due to the easy-to-reverse nature of Java,
code protection for Android apps is of particular importance. To this end, code obfuscation is …

A large scale investigation of obfuscation use in google play

D Wermke, N Huaman, Y Acar, B Reaves… - arXiv preprint arXiv …, 2018 - arxiv.org
Android applications are frequently plagiarized or repackaged, and software obfuscation is a
recommended protection against these practices. However, there is very little data on the …

Coevolution of mobile malware and anti-malware

S Sen, E Aydogan, AI Aysan - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Mobile malware is one of today's greatest threats in computer security. Furthermore, new
mobile malware is emerging daily that introduces new security risks. However, while existing …

A large-scale empirical study on the effects of code obfuscations on android apps and anti-malware products

M Hammad, J Garcia, S Malek - … of the 40th international conference on …, 2018 - dl.acm.org
The Android platform has been the dominant mobile platform in recent years resulting in
millions of apps and security threats against those apps. Anti-malware products aim to …

A novel pattern recognition system for detecting Android malware by analyzing suspicious boot sequences

JM Vidal, MAS Monge, LJG Villalba - Knowledge-Based Systems, 2018 - Elsevier
This paper introduces a malware detection system for smartphones based on studying the
dynamic behavior of suspicious applications. The main goal is to prevent the installation of …

Self-protection of android systems from inter-component communication attacks

M Hammad, J Garcia, S Malek - Proceedings of the 33rd ACM/IEEE …, 2018 - dl.acm.org
The current security mechanisms for Android apps, both static and dynamic analysis
approaches, are insufficient for detection and prevention of the increasingly dynamic and …

Updroid: Updated android malware and its familial classification

K Aktas, S Sen - Secure IT Systems: 23rd Nordic Conference, NordSec …, 2018 - Springer
Android is the platform most targeted by attackers. While security solutions have improved
against such attacks on one side, attackers introduce new variants of existing malware by …

The role of weaponized malware in cyber conflict and espionage

C Easttom - Proc. 13th Int. Conf. Cyber Warfare Secur.(ICCWS), 2018 - books.google.com
Cyber-conflict is a part of the current national defence landscape. Malware is often the
primary weapon in cyber conflict. This is true whether the malware is being employed by …

An examination of the operational requirements of weaponised malware

C Easttom - Journal of Information Warfare, 2018 - JSTOR
Malware is often used in cyberconflict scenarios. Both nation-states and non-nation threat
actor groups utilise malware to execute cyberattacks. The current study examines the …