Rootector: robust android rooting detection framework using machine learning algorithms

WF Elsersy, NB Anuar, MFA Razak - Arabian Journal for Science and …, 2023 - Springer
Recently, the newly launched Google protect service alerts Android users from installing
rooting tools. However, Android users lean toward rooting their Android devices to gain …

Two effective methods to detect mobile malware

X Xiao, P Fu, X Xiao, Y Jiang, Q Li… - 2015 4th International …, 2015 - ieeexplore.ieee.org
Malware in Android has enjoyed a prevalence as Android has taken up a primary market in
the mobile devices. In this paper, Adaptive Regularization Of Weights (AROW) and Support …

PtmxGuard: An improved method for android kernel to prevent privilege escalation attack

B Kong, Y Li, LP Ma - ITM Web of Conferences, 2017 - itm-conferences.org
Vulnerabilities in Android kernel give opportunity for attacker to damage the system.
Privilege escalation is one of the most dangerous attacks, as it helps attacker to gain root …

Super Root: A New Stealthy Rooting Technique on ARM Devices

Z Zhang, Y Cheng, Z Li - Applied Cryptography and Network Security: 18th …, 2020 - Springer
Root attack is an unauthorized process of gaining the highest privilege by exploiting the
vulnerabilities of a system. After that, attackers can fully control the system, arbitrarily access …

Android methods hooking detection using dalvik code and dynamic reverse engineering by stack trace analysis

M Szczepanik, M Kędziora, I Jóźwiak - International Conference on …, 2020 - Springer
This research paper is focused on the issue of method hooking detection which in most of
the existing solutions is focused on detection of the framework itself without checking of its …

Comprehensive Approach to Mitigating Vulnerabilities in the Mobile Operating System

A Shetty, S Shinde, T Nayak… - 2024 4th Asian …, 2024 - ieeexplore.ieee.org
The widespread adoption of the Android operating system in mobile devices has made it an
attractive target for cyber attackers. As the Android ecosystem continues to grow, the need …

On Root Detection Strategies for Android Devices

R Bialon - arXiv preprint arXiv:2012.01812, 2020 - arxiv.org
The Android operating system runs on the majority of smartphones nowadays. Its success is
driven by its availability to a variety of smartphone hardware vendors on the one hand, and …

Security threats analysis for Android based Mobile Device

S Yoon, Y Jeon - 2014 International Conference on Information …, 2014 - ieeexplore.ieee.org
Recently, the number of mobile malware is rapidly growing. In order to cope with mobile
malware, the detection and response method of rooting attack is actively studied. However …

Modified mobile transaction authentication number system for 2-layer security

WA Khan, Y Saleem, GA Shah… - … on Intelligent Systems …, 2016 - ieeexplore.ieee.org
Mobile phones are commonly used by web servers to validate user's identification and
authentication. It enhances user's trust in online transactions and empowers him to use his …

[PDF][PDF] Mobile root exploit detection based on system events extracted from android platform

YJ Ham, WB Choi, HW Lee - Proceedings of the International …, 2013 - world-comp.org
Recently, the number of attacks by malicious application has significantly increased,
targeting Android-platform mobile terminal such as Samsung Galaxy Note I/II and Galaxy …