The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

Android security: a survey of issues, malware penetration, and defenses

P Faruki, A Bharmal, V Laxmi… - … surveys & tutorials, 2014 - ieeexplore.ieee.org
Smartphones have become pervasive due to the availability of office applications, Internet,
games, vehicle guidance using location-based services apart from conventional services …

[PDF][PDF] Drebin: Effective and explainable detection of android malware in your pocket.

D Arp, M Spreitzenbarth, M Hubner, H Gascon… - Ndss, 2014 - media.telefonicatech.com
Malicious applications pose a threat to the security of the Android platform. The growing
amount and diversity of these applications render conventional defenses largely ineffective …

Lightweight, obfuscation-resilient detection and family identification of android malware

J Garcia, M Hammad, S Malek - ACM Transactions on Software …, 2018 - dl.acm.org
The number of malicious Android apps is increasing rapidly. Android malware can damage
or alter other files or settings, install additional applications, and so on. To determine such …

When malware is packin'heat; limits of machine learning classifiers based on static analysis features

H Aghakhani, F Gritti, F Mecca, M Lindorfer… - Network and …, 2020 - par.nsf.gov
Machine learning techniques are widely used in addition to signatures and heuristics to
increase the detection rate of anti-malware software, as they automate the creation of …

Droidchameleon: evaluating android anti-malware against transformation attacks

V Rastogi, Y Chen, X Jiang - Proceedings of the 8th ACM SIGSAC …, 2013 - dl.acm.org
Mobile malware threats have recently become a real concern. In this paper, we evaluate the
state-of-the-art commercial mobile antimalware products for Android and test how resistant …

Finding unknown malice in 10 seconds: Mass vetting for new threats at the {Google-Play} scale

K Chen, P Wang, Y Lee, XF Wang, N Zhang… - 24th USENIX Security …, 2015 - usenix.org
An app market's vetting process is expected to be scalable and effective. However, today's
vetting mechanisms are slow and less capable of catching new threats. In our research, we …

Beyond google play: A large-scale comparative study of chinese android app markets

H Wang, Z Liu, J Liang, N Vallina-Rodriguez… - Proceedings of the …, 2018 - dl.acm.org
China is one of the largest Android markets in the world. As Chinese users cannot access
Google Play to buy and install Android apps, a number of independent app stores have …

A survey of android application and malware hardening

V Sihag, M Vardhan, P Singh - Computer Science Review, 2021 - Elsevier
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …

Droid analytics: a signature based analytic system to collect, extract, analyze and associate android malware

M Zheng, M Sun, JCS Lui - … on Trust, Security and Privacy in …, 2013 - ieeexplore.ieee.org
Smartphones and mobile devices are rapidly becoming indispensable devices for many
users. Unfortunately, they also become fertile grounds for hackers to deploy malware. There …