Uncovering and exploiting hidden apis in mobile super apps

C Wang, Y Zhang, Z Lin - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Mobile applications, particularly those from social media platforms such as WeChat and
TikTok, are evolving into" super apps" that offer a wide range of services such as instant …

Dynamic Security Analysis on Android: A Systematic Literature Review

T Sutter, T Kehrer, M Rennhard, B Tellenbach… - IEEE …, 2024 - ieeexplore.ieee.org
Dynamic analysis is a technique that is used to fully understand the internals of a system at
runtime. On Android, dynamic security analysis involves real-time assessment and active …

CamoDroid: An Android application analysis environment resilient against sandbox evasion

F Faghihi, M Zulkernine, S Ding - Journal of Systems Architecture, 2022 - Elsevier
In the past few years, numerous attempts have been made to mitigate evasive Android
malware. However, it remains one of the challenges in smartphone security. Evasive …

Rootector: robust android rooting detection framework using machine learning algorithms

WF Elsersy, NB Anuar, MFA Razak - Arabian Journal for Science and …, 2023 - Springer
Recently, the newly launched Google protect service alerts Android users from installing
rooting tools. However, Android users lean toward rooting their Android devices to gain …

Horus: A security assessment framework for android crypto wallets

MS Uddin, M Mannan, A Youssef - … 2021, Virtual Event, September 6–9 …, 2021 - Springer
Crypto wallet apps help cryptocurrency users to create, store, and manage keys, sign
transactions and keep track of funds. However, if these apps are not adequately protected …

[PDF][PDF] Mobile cloud database security: problems and solutions

M Ismail, N El-Rashidy, N Moustafa - Fusion: Practice and …, 2021 - researchgate.net
The rise in mobile Internet usage and increased reliance on cloud computing have led to
increased fear of cloud database security. Mobile cloud computing has emerged as the only …

[PDF][PDF] Dynamic Mobile Malware Detection through System Call-based Image representation.

R Casolare, C De Dominicis, G Iadarola… - J. Wirel. Mob. Networks …, 2021 - jowua.com
Mobile devices, with particular regard to the ones equipped with the Android operating
system, are currently targeted by malicious writers that continuously develop harmful code …

[HTML][HTML] Towards the advancement of cashless transaction: A security analysis of electronic payment systems

IT Moon, M Shamsuzzaman, MMR Mridha… - Journal of Computer and …, 2022 - scirp.org
In recent decades, day-to-day lifestyle requires online payments as easy and simple
solutions to several financial transactions, which makes the concept of Electronic payment …

BPFroid: robust real time Android malware detection framework

Y Agman, D Hendler - arXiv preprint arXiv:2105.14344, 2021 - arxiv.org
We present BPFroid--a novel dynamic analysis framework for Android that uses the eBPF
technology of the Linux kernel to continuously monitor events of user applications running …

A survey on secure android apps development life-cycle: Vulnerabilities and tools

MEA Tebib, M Graa, P Andre - International Journal On Advances in …, 2023 - hal.science
Mobile devices are increasingly used in our daily lives. To fulfill the needs of smartphone
users, the development of mobile applications has been growing at a high rate. As …