A survey of android application and malware hardening

V Sihag, M Vardhan, P Singh - Computer Science Review, 2021 - Elsevier
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …

Text Steganography Methods and their Influence in Malware: A Comprehensive Overview and Evaluation

M Knöchel, S Karius - Proceedings of the 2024 ACM Workshop on …, 2024 - dl.acm.org
Steganography describes techniques and algorithms for hiding secret information in a cover
medium such as images, audio or text files. Malware that makes use of steganographic …

Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems

L Chen, Y Wang, Q Cai, Y Zhan, H Hu… - 30th USENIX Security …, 2021 - usenix.org
IoT devices have brought invaluable convenience to our daily life. However, their
pervasiveness also amplifies the impact of security vulnerabilities. Many popular …

Precisely Extracting Complex Variable Values from Android Apps

M Miltenberger, S Arzt - ACM Transactions on Software Engineering and …, 2024 - dl.acm.org
Millions of users nowadays rely on their smartphones to process sensitive data through apps
from various vendors and sources. Therefore, it is vital to assess these apps for security …

Use of cryptography in malware obfuscation

HJ Asghar, BZH Zhao, M Ikram, G Nguyen… - Journal of Computer …, 2024 - Springer
Malware authors often use cryptographic tools such as XOR encryption and block ciphers
like AES to obfuscate part of the malware to evade detection. Use of cryptography may give …

Collect responsibly but deliver arbitrarily? a study on cross-user privacy leakage in mobile apps

S Li, Z Yang, N Hua, P Liu, X Zhang, G Yang… - Proceedings of the 2022 …, 2022 - dl.acm.org
Recent years have witnessed the interesting trend that modern mobile apps perform more
and more likely as user-to-user platforms, where app users can be freely and conveniently …

Exploring the use of static and dynamic analysis to improve the performance of the mining sandbox approach for android malware identification

FH da Costa, I Medeiros, T Menezes, JV da Silva… - Journal of Systems and …, 2022 - Elsevier
The popularization of the Android platform and the growing number of Android applications
(apps) that manage sensitive data turned the Android ecosystem into an attractive target for …

Demystifying hidden sensitive operations in android apps

X Sun, X Chen, L Li, H Cai, J Grundy, J Samhi… - ACM Transactions on …, 2023 - dl.acm.org
Security of Android devices is now paramount, given their wide adoption among consumers.
As researchers develop tools for statically or dynamically detecting suspicious apps …

Evaluation Methodologies in Software Protection Research

B De Sutter, S Schrittwieser, B Coppens… - arXiv preprint arXiv …, 2023 - arxiv.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

FA3 Fine-Grained Android Application Analysis

Y Lin, J Wong, D Gao - Proceedings of the 24th International Workshop …, 2023 - dl.acm.org
Understanding Android applications' behavior is essential to many security applications, eg,
malware analysis. Although many systems have been proposed to perform such dynamic …