Machine learning aided Android malware classification

N Milosevic, A Dehghantanha, KKR Choo - Computers & Electrical …, 2017 - Elsevier
The widespread adoption of Android devices and their capability to access significant
private and confidential information have resulted in these devices being targeted by …

Android malware detection based on system call sequences and LSTM

X Xiao, S Zhang, F Mercaldo, G Hu… - Multimedia Tools and …, 2019 - Springer
As Android-based mobile devices become increasingly popular, malware detection on
Android is very crucial nowadays. In this paper, a novel detection method based on deep …

Ransomware steals your phone. formal methods rescue it

F Mercaldo, V Nardone, A Santone… - … 2016, Held as Part of the …, 2016 - Springer
Ransomware is a recent type of malware which makes inaccessible the files or the device of
the victim. The only way to unlock the infected device or to have the keys for decrypting the …

A survey of practical formal methods for security

T Kulik, B Dongol, PG Larsen, HD Macedo… - Formal aspects of …, 2022 - dl.acm.org
In today's world, critical infrastructure is often controlled by computing systems. This
introduces new risks for cyber attacks, which can compromise the security and disrupt the …

Talos: no more ransomware victims with formal methods

A Cimitile, F Mercaldo, V Nardone, A Santone… - International Journal of …, 2018 - Springer
Ransomware is a very effective form of malware that is recently spreading out on an
impressive number of workstations and smartphones. This malware blocks the access to the …

Circumventing Google Play vetting policies: A stealthy cyberattack that uses incremental updates to breach privacy

Z Muhammad, F Amjad, Z Iqbal, AR Javed… - Journal of Ambient …, 2023 - Springer
Today digital technologies are evolving to accommodate small businesses and young
entrepreneurs by reducing their time-to-market while encouraging rapid innovation in …

Model checking for malicious family detection and phylogenetic analysis in mobile environment

MGCA Cimino, N De Francesco, F Mercaldo… - Computers & …, 2020 - Elsevier
Malware targeting mobile devices is widespread, in fact considering the great amount of
sensitive and private information stored in tablets and smartphones they represent an …

Leila: formal tool for identifying mobile malicious behaviour

G Canfora, F Martinelli, F Mercaldo… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
With the increasing diffusion of mobile technologies, nowadays mobile devices represent an
irreplaceable tool to perform several operations, from posting a status on a social network to …

Dynamic malware detection and phylogeny analysis using process mining

ML Bernardi, M Cimitile, D Distante, F Martinelli… - International Journal of …, 2019 - Springer
In the last years, mobile phones have become essential communication and productivity
tools used daily to access business services and exchange sensitive data. Consequently …

Ransomware inside out

F Mercaldo, V Nardone… - 2016 11th International …, 2016 - ieeexplore.ieee.org
Android is currently the most widely used mobile environment. This trend encourages
malware writers to develop specific attacks targeting this platform with threats designed to …