{UIHash}: Detecting Similar Android {UIs} through {Grid-Based} Visual Appearance Representation

J Li, J Mao, J Zeng, Q Lin, S Feng, Z Liang - 33rd USENIX Security …, 2024 - usenix.org
User interfaces (UIs) is the main channel for users to interact with mobile apps. As such,
attackers often create similar-looking UIs to deceive users, causing various security …

Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey

TT Longtchi, RM Rodriguez, L Al-Shawaf… - Proceedings of the …, 2024 - ieeexplore.ieee.org
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …

Mobile and web applications clones: A comprehensive study

S Alhashmi, A Alneyadi, M Alshehhi… - … and Mobile Computing …, 2023 - ieeexplore.ieee.org
The growth of mobile application and website markets resulted in a diverse range of apps
that are localized or curated for specific use cases. This make it challenging for users to …

Analyzing structural similarity of user interface layouts of Android apps using deep learning

N da Cruz Alves, L Kreuch… - Proceedings of the 21st …, 2022 - dl.acm.org
The layout of graphical user interfaces (GUIs) takes into consideration the distribution of
buttons, images, texts, and other components that are important factors for a positive …

[PDF][PDF] 基于异常利用的安卓应用重打包对抗技术

周立博, 梁彬, 游伟, 黄建军, 石文昌 - 信息安全学报, 2022 - jcs.iie.ac.cn
摘要应用重打包是安卓生态中的一种严重的安全威胁. 借助应用重打包技术,
攻击者可以向原始应用插入恶意代码以实现不同的恶意功能, 如窃取用户隐私数据 …

Android malware detection: A comprehensive review

AVS Bhavan, S Golla, Y Poral, AS Paul… - … Advances in Network …, 2024 - taylorfrancis.com
There is an increasing trend to use mobile devices compared to other electronic devices in
modern-day society. Android is currently the most popular mobile operating system. Many of …

Characterizing Internet-Based Social Engineering Attacks Through a Psychological Lens

TT Longtchi - 2024 - search.proquest.com
Internet-based social engineering attacks have become a major cyber threat. These attacks
use manipulative and deceptive means to make individuals divulge sensitive information or …

Analysis of Android Applications Shared on Twitter Focusing on Accessibility Services

S Ichioka, E Pouget, T Mimura, J Nakajima… - Journal of Information …, 2022 - jstage.jst.go.jp
As the use of mobile devices for financial payments continues to increase, prevention of
attacks by Android malware becomes critical. In this study, we collected apps shared on …

[PDF][PDF] Towards Semantic Clone Detection, Benchmarking, and Evaluation

FA Al-omari - 2021 - harvest.usask.ca
Developers copy and paste their code to speed up the development process. Sometimes,
they copy code from other systems or look up code online to solve a complex problem …

[PDF][PDF] Applied Mathematics and Nonlinear Sciences

J Li - 2023 - intapi.sciendo.com
Quality assessment of university education and teaching is an essential and important part
of teaching and learning activities. Over the years, a large amount of data has been …