The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

Mobile malware attacks: Review, taxonomy & future directions

A Qamar, A Karim, V Chang - Future Generation Computer Systems, 2019 - Elsevier
A pervasive increase in the adoption rate of smartphones with Android OS is noted in recent
years. Android's popular and attractive environment not only captured the attention of users …

Lightweight classification of IoT malware based on image recognition

J Su, DV Vasconcellos, S Prasad… - 2018 IEEE 42Nd …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is an extension of the traditional Internet, which allows a very
large number of smart devices, such as home appliances, network cameras, sensors and …

Machine learning aided Android malware classification

N Milosevic, A Dehghantanha, KKR Choo - Computers & Electrical …, 2017 - Elsevier
The widespread adoption of Android devices and their capability to access significant
private and confidential information have resulted in these devices being targeted by …

[PDF][PDF] You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.

Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee… - NDSS, 2020 - kangkookjee.io
To subvert recent advances in perimeter and host security, the attacker community has
developed and employed various attack vectors to make a malware much stealthier than …

Droidapiminer: Mining api-level features for robust malware detection in android

Y Aafer, W Du, H Yin - Security and Privacy in Communication Networks …, 2013 - Springer
The increasing popularity of Android apps makes them the target of malware authors. To
defend against this severe increase of Android malwares and help users make a better …

Crowdroid: behavior-based malware detection system for android

I Burguera, U Zurutuza, S Nadjm-Tehrani - … of the 1st ACM workshop on …, 2011 - dl.acm.org
The sharp increase in the number of smartphones on the market, with the Android platform
posed to becoming a market leader makes the need for malware analysis on this platform an …

The rise of ransomware: Forensic analysis for windows based ransomware attacks

I Kara, M Aydos - Expert Systems with Applications, 2022 - Elsevier
While information technologies grow and propagate worldwide, malwares have modified
and risen their efficiency towards information system. Recently, the attackers have started to …

A survey on security for mobile devices

M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …

Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms

S Kumar, D Pollutro - US Patent 8,776,180, 2014 - Google Patents
Instrumented networks, computer systems and platforms having target subjects (devices,
transactions, services, users, organizations) are disclosed. A security orchestration service …