A survey of android application and malware hardening

V Sihag, M Vardhan, P Singh - Computer Science Review, 2021 - Elsevier
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …

The rise of obfuscated Android malware and impacts on detection methods

WF Elsersy, A Feizollah, NB Anuar - PeerJ Computer Science, 2022 - peerj.com
The various application markets are facing an exponential growth of Android malware. Every
day, thousands of new Android malware applications emerge. Android malware hackers …

BLADE: Robust malware detection against obfuscation in android

V Sihag, M Vardhan, P Singh - Forensic Science International: Digital …, 2021 - Elsevier
Android OS popularity has given significant rise to malicious apps targeting it. Malware use
state of the art obfuscation methods to hide their functionality and evade anti-malware …

DroidHook: a novel API-hook based Android malware dynamic analysis sandbox

Y Cui, Y Sun, Z Lin - Automated Software Engineering, 2023 - Springer
With the popularity of Android devices, mobile apps are prevalent in our daily life, making
them a target for attackers to steal private data and push advertisements. Dynamic analysis …

Identifying applications' state via system calls activity: a pipeline approach

F Maasmi, M Morcos, H Al Hamadi… - 2021 28th IEEE …, 2021 - ieeexplore.ieee.org
Android is the most widespread smartphone operating system. Its popularity attracted
attackers to develop all sorts of malicious applications. On the defense side, much research …

Enhancing Mobile Enterprise Security: A Blockchain and Agent Paradigm-Based Approach for Continuous Protection and Rapid Adaptation

R Khellaf, S Boudouda - IEEE Access, 2024 - ieeexplore.ieee.org
With the increasing use of mobiles in the workplace, companies need a strict yet flexible
security framework to balance risk and trust. This need has led to the expansion and rapid …

Mobile code anti-reversing scheme based on bytecode trapping in art

G Na, J Lim, S Lee, JH Yi - Sensors, 2019 - mdpi.com
As interest in Internet of Things environments rapidly increases throughout the IT
convergence field, compatibility with mobile devices must be provided to enable …

Potentially Unwanted App Detection for Blockchain-Based Android App Marketplace

Y Cui, Y Sun, Z Lin, B Ma, Y Li - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Android is a mobile operating system with a high degree of openness, which attracts an
increasing number of developers. Android application (or simply, app) marketplace provides …

Automated multi-layered bytecode generation for preventing sensitive information leaks from android applications

G Jeon, M Choi, S Lee, JH Yi, H Cho - IEEE Access, 2021 - ieeexplore.ieee.org
Sensitive information leakages from applications are a critical issue in the Android
ecosystem. Despite the advance of techniques to secure applications such as packing and …

Hybrid Dynamic Analysis for Android Malware Protected by Anti-Analysis Techniques with DOOLDA

S Lee, Y Shin, M Choi, H Cho, JH Yi - Journal of Internet Technology, 2024 - jit.ndhu.edu.tw
A lot of the recently reported malware is equipped with the anti-analysis techniques (eg, anti-
emulation, anti-debugging, etc.) for preventing from being the analyzed, which can delay …