A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

[PDF][PDF] A Friend or a Foe? Detecting Malware using Memory and CPU Features.

J Milosevic, M Malek, A Ferrante - SECRYPT, 2016 - pdfs.semanticscholar.org
With an ever-increasing and ever more aggressive proliferation of malware, its detection is
of utmost importance. However, due to the fact that IoT devices are resource-constrained, it …

DroidLight: Lightweight anomaly-based intrusion detection system for smartphone devices

S Barbhuiya, P Kilpatrick, DS Nikolopoulos - Proceedings of the 21st …, 2020 - dl.acm.org
Smartphone malware attacks are increasing alongside the growth of smartphone
applications in the market. Researchers have proposed techniques to detect malware …

Time, accuracy and power consumption tradeoff in mobile malware detection systems

J Milosevic, M Malek, A Ferrante - Computers & Security, 2019 - Elsevier
In order to incorporate mobile malware detection into embedded systems and Internet of
Things (IoT) the question of optimizing the tradeoff between detection accuracy, detection …

Malware threats and solutions for trustworthy mobile systems design

J Milosevic, F Regazzoni, M Malek - … and Trust: Design and Deployment of …, 2017 - Springer
Trustworthiness of mobile devices involves trustworthiness of both hardware and software
components. Trustworthiness of hardware is achieved by addressing threats such as …

Towards a 2-hybrid Android malware detection test framework

A Rodriguez-Mota… - 2016 International …, 2016 - ieeexplore.ieee.org
Current pervasive usage of mobile devices around the world has rose big security and data
protection concerns both into the application development process as into the data security …

[图书][B] Efficient permission-aware analysis of android apps

A Sadeghi - 2018 - search.proquest.com
Permissions are the cornerstone for Android security model, as they enable secure access
to sensitive resources of the phone. Consequently, improper use of Android permission …

Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach

NO Ogwara, K Petrova, ML Yang… - Advances in Security …, 2021 - Springer
This chapter reviews existing Intrusion Detection Systems (IDS) that target the Mobile Cloud
Computing (MCC), Cloud Computing (CC), and Mobile Device (MD) environment. The …

[PDF][PDF] Detect and prevent the mobile malware

AM Rashid, AT Al-Oqaily - International Journal of Scientific and …, 2015 - researchgate.net
Mobile devices such as mobile phones have become one of the most needed and important
device for everyone living in the 21st century. This is due to their ability in accommodating …

Security challenges for hardware designers of mobile systems

J Milosevic, A Ferrante… - 2015 Mobile Systems …, 2015 - ieeexplore.ieee.org
Mobile devices have been pervading many aspects of our lives, including applications that
are critical and deal with sensitive data. Together with existing features, designers are …