Reinforcement learning based adversarial malware example generation against black-box detectors

F Zhong, P Hu, G Zhang, H Li, X Cheng - Computers & Security, 2022 - Elsevier
Recent advances in machine learning offer attractive tools for sophisticated adversaries. An
attacker could transform malware into its adversarial version but retain its malicious …

Dalvik opcode graph based android malware variants detection using global topology features

J Zhang, Z Qin, K Zhang, H Yin, J Zou - IEEE Access, 2018 - ieeexplore.ieee.org
Since Android has become the dominator of smartphone operating system market with a
share of 86.8%, the number of Android malicious applications are increasing rapidly as well …

[HTML][HTML] Android fragmentation in malware detection

L Nguyen-Vu, J Ahn, S Jung - Computers & Security, 2019 - Elsevier
Differences between Android versions affect not only application developers but also make
the task of securing Android harder, as it is not easy to keep track of updates. In this paper …

Android applications scanning: The guide

I Almomani, A Khayer - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
The booming of Android technology makes Android users and their devices with all running
applications targeted by many security attackers. These attackers intent to inject malicious …

Analysis of Anubis Trojan Attack on Android Banking Application Using Mobile Security Labware.

I Riadi, D Aprilliansyah - International Journal of Safety & …, 2023 - search.ebscohost.com
Mobile banking transactions, especially on the Android platform, are now a method often
used to carry out payment and shopping activities in e-commerce. Security risks in mobile …

Android application security scanning process

I Almomani, M Alenezi - Telecommunication Systems-Principles …, 2019 - books.google.com
This chapter presents the security scanning process for Android applications. The aim is to
guide researchers and developers to the core phases/steps required to analyze Android …

Ransomware Detection Techniques Using Machine Learning Methods

SA Wadho, A Yichiet, ML Gan, CK Lee… - 2024 IEEE 1st …, 2024 - ieeexplore.ieee.org
Considering the rising frequency and refinement of ransomware attacks, there is a rising
significance for dynamic and successful methods of detection and mitigation. Conventional …

An Online Automated Anti-anti-virus Method

L Ma, H Yang, Y Chai, J Fan, W Yang - Inernational Conference on …, 2021 - Springer
In offensive and defensive exercises, the security detection side (red team) conducts
simulated real network attacks from various entry points to the maximum extent in limited …

Abusing iOS Permissions: A Security Perspective

F Alanazy, R Saifan, M Al-Akhras… - … Multi-Conference on …, 2024 - ieeexplore.ieee.org
Smartphone users have become accustomed to installing Apps of different categories such
as gaming, business, educational, lifestyle, and many more Apps. However, even with the …

Analyzing OneNote Malware through Static and Dynamic Analysis: Detection and Mitigation Measures

MN Ahmed - 2023 International Conference on IT and Industrial …, 2023 - ieeexplore.ieee.org
OneNote is a widely used digital notebook application by individuals and organizations
worldwide. In recent months, the attacker has used OneNote malware as a primary source to …