Comprehensive review and analysis of anti-malware apps for smartphones

M Talal, AA Zaidan, BB Zaidan, OS Albahri… - Telecommunication …, 2019 - Springer
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …

50 ways to leak your data: An exploration of apps' circumvention of the android permissions system

J Reardon, Á Feal, P Wijesekera, AEB On… - 28th USENIX security …, 2019 - usenix.org
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …

[HTML][HTML] The Android malware detection systems between hope and reality

K Bakour, HM Ünver, R Ghanem - SN applied sciences, 2019 - Springer
The widespread use of Android-based smartphones made it an important target for
malicious applications' developers. So, a large number of frameworks have been proposed …

On the effectiveness of system API-related information for Android ransomware detection

M Scalas, D Maiorca, F Mercaldo, CA Visaggio… - Computers & …, 2019 - Elsevier
Ransomware constitutes a significant threat to the Android operating system. It can either
lock or encrypt the target devices, and victims are forced to pay ransoms to restore their data …

On the ridiculousness of notice and consent: Contradictions in app privacy policies

E Okoyomon, N Samarin… - … (ConPro 2019), in …, 2019 - dspace.networks.imdea.org
The dominant privacy framework of the information age relies on notions of “notice and
consent.” That is, service providers will disclose, often through privacy policies, their data …

[HTML][HTML] AndrODet: An adaptive Android obfuscation detector

O Mirzaei, JM de Fuentes, J Tapiador… - Future Generation …, 2019 - Elsevier
Obfuscation techniques modify an app's source (or machine) code in order to make it more
difficult to analyze. This is typically applied to protect intellectual property in benign apps, or …

Experimental analysis of Android malware detection based on combinations of permissions and API-calls

AK Singh, CD Jaidhar, MAA Kumara - Journal of Computer Virology and …, 2019 - Springer
Android-based smartphones are gaining popularity, due to its cost efficiency and various
applications. These smartphones provide the full experience of a computing device to its …

A deep camouflage: evaluating android's anti-malware systems robustness against hybridization of obfuscation techniques with injection attacks

K Bakour, HM Ünver, R Ghanem - Arabian Journal for Science and …, 2019 - Springer
The threats facing smartphones have become one of the most dangerous cyberspace
threats; therefore, many solutions have been developed in the commercial or academic …

Robust detection of obfuscated strings in android apps

A Mohammadinodooshan, U Kargén… - Proceedings of the 12th …, 2019 - dl.acm.org
While string obfuscation is a common technique used by mobile developers to prevent
reverse engineering of their apps, malware authors also often employ it to, for example …

恶意代码演化与溯源技术研究

宋文纳, 彭国军, 傅建明, 张焕国, 陈施旅 - 软件学报, 2019 - jos.org.cn
恶意代码溯源是指通过分析恶意代码生成, 传播的规律以及恶意代码之间衍生的关联性,
基于目标恶意代码的特性实现对恶意代码源头的追踪. 通过溯源可快速定位攻击来源或者攻击者 …