{UIHash}: Detecting Similar Android {UIs} through {Grid-Based} Visual Appearance Representation

J Li, J Mao, J Zeng, Q Lin, S Feng, Z Liang - 33rd USENIX Security …, 2024 - usenix.org
User interfaces (UIs) is the main channel for users to interact with mobile apps. As such,
attackers often create similar-looking UIs to deceive users, causing various security …

Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey

TT Longtchi, RM Rodriguez, L Al-Shawaf… - Proceedings of the …, 2024 - ieeexplore.ieee.org
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …

Android malware detection: A comprehensive review

AVS Bhavan, S Golla, Y Poral, AS Paul… - … Advances in Network …, 2024 - taylorfrancis.com
There is an increasing trend to use mobile devices compared to other electronic devices in
modern-day society. Android is currently the most popular mobile operating system. Many of …

Characterizing Internet-Based Social Engineering Attacks Through a Psychological Lens

TT Longtchi - 2024 - search.proquest.com
Internet-based social engineering attacks have become a major cyber threat. These attacks
use manipulative and deceptive means to make individuals divulge sensitive information or …