Detection approaches for android malware: Taxonomy and review analysis

HHR Manzil, SM Naik - Expert Systems with Applications, 2023 - Elsevier
The main objective of this review is to present an in-depth study of Android malware
detection approaches. This article provides a comprehensive survey of 150 studies on …

The rise of obfuscated Android malware and impacts on detection methods

WF Elsersy, A Feizollah, NB Anuar - PeerJ Computer Science, 2022 - peerj.com
The various application markets are facing an exponential growth of Android malware. Every
day, thousands of new Android malware applications emerge. Android malware hackers …

Android malware category detection using a novel feature vector-based machine learning model

HHR Manzil, S Manohar Naik - Cybersecurity, 2023 - Springer
Malware attacks on the Android platform are rapidly increasing due to the high consumer
adoption of Android smartphones. Advanced technologies have motivated cyber-criminals to …

The current state and future of mobile security in the light of the recent mobile security threat reports

AC Cinar, TB Kara - Multimedia Tools and Applications, 2023 - Springer
Smartphones have become small computers that meet many of our needs, from e-mail and
banking transactions to communication and social media use. In line with these attractive …

Measuring software obfuscation quality–a systematic literature review

SA Ebad, AA Darem, JH Abawajy - IEEE Access, 2021 - ieeexplore.ieee.org
Software obfuscation techniques are increasingly being used to prevent attackers from
exploiting security flaws and launching successful attacks. With research on software …

Remote direct memory introspection

H Liu, J Xing, Y Huang, D Zhuo, S Devadas… - 32nd USENIX Security …, 2023 - usenix.org
Hypervisors have played a critical role in cloud security, but they introduce a large trusted
computing base (TCB) and incur a heavy performance tax. As of late, hypervisor offloading …

[HTML][HTML] A temporal analysis and evaluation of fuzzy hashing algorithms for Android malware analysis

M Fleming, O Olukoya - Forensic Science International: Digital Investigation, 2024 - Elsevier
Fuzzy hashing has been utilised in digital forensics and malware analysis for malware
detection, malware variant classification, file clustering, document similarity detection …

A comprehensive review on permissions-based Android malware detection

Y Sharma, A Arora - International Journal of Information Security, 2024 - Springer
The first Android-ready “G1” phone debuted in late October 2008. Since then, the growth of
Android malware has been explosive, analogous to the rise in the popularity of Android. The …

Android Malware: Comprehensive Study and a Cross-Feature Light Weight Proposed Solution

S Jain, T Gera, R Gill - 2023 IEEE North Karnataka Subsection …, 2023 - ieeexplore.ieee.org
The need for adequate safety precautions for Android-based gadgets has grown due to the
fast expansion of applications for the platform and the sophisticated nature of threats such as …

Exploring Android Obfuscators and Deobfuscators: An Empirical Investigation

SA Ebad, AA Darem - Electronics, 2024 - mdpi.com
Researchers have proposed different obfuscation transformations supported by numerous
smartphone protection tools (obfuscators and deobfuscators). However, there is a need for a …