A survey on security for mobile devices

M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …

Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations

JPA Yaacoub, HN Noura, O Salman, A Chehab - Internet of Things, 2022 - Elsevier
Recently, the number of cyber attacks against IoT domains has increased tremendously.
This resulted into both human and financial losses at all IoT levels especially individual and …

Crowdroid: behavior-based malware detection system for android

I Burguera, U Zurutuza, S Nadjm-Tehrani - … of the 1st ACM workshop on …, 2011 - dl.acm.org
The sharp increase in the number of smartphones on the market, with the Android platform
posed to becoming a market leader makes the need for malware analysis on this platform an …

“Andromaly”: a behavioral malware detection framework for android devices

A Shabtai, U Kanonov, Y Elovici, C Glezer… - Journal of Intelligent …, 2012 - Springer
This article presents Andromaly—a framework for detecting malware on Android mobile
devices. The proposed framework realizes a Host-based Malware Detection System that …

Privilege escalation attacks on android

L Davi, A Dmitrienko, AR Sadeghi… - Information Security: 13th …, 2011 - Springer
Android is a modern and popular software platform for smartphones. Among its predominant
features is an advanced security model which is based on application-oriented mandatory …

Droidminer: Automated mining and characterization of fine-grained malicious behaviors in android applications

C Yang, Z Xu, G Gu, V Yegneswaran… - … Security-ESORICS 2014 …, 2014 - Springer
Most existing malicious Android app detection approaches rely on manually selected
detection heuristics, features, and models. In this paper, we describe a new, complementary …

Mobile malware detection through analysis of deviations in application network behavior

A Shabtai, L Tenenboim-Chekina, D Mimran… - Computers & …, 2014 - Elsevier
In this paper we present a new behavior-based anomaly detection system for detecting
meaningful deviations in a mobile application's network behavior. The main goal of the …

Detecting android malware using sequences of system calls

G Canfora, E Medvet, F Mercaldo… - Proceedings of the 3rd …, 2015 - dl.acm.org
The increasing diffusion of smart devices, along with the dynamism of the mobile
applications ecosystem, are boosting the production of malware for the Android platform. So …

Automated static code analysis for classifying android applications using machine learning

A Shabtai, Y Fledel, Y Elovici - 2010 international conference …, 2010 - ieeexplore.ieee.org
In this paper we apply Machine Learning (ML) techniques on static features that are
extracted from Android's application files for the classification of the files. Features are …

Permission based Android security: Issues and countermeasures

Z Fang, W Han, Y Li - computers & security, 2014 - Elsevier
Android security has been a hot spot recently in both academic research and public
concerns due to numerous instances of security attacks and privacy leakage on Android …