Malicious application detection in android—a systematic literature review

T Sharma, D Rattan - Computer Science Review, 2021 - Elsevier
Context: In last decade, due to tremendous usage of smart phones it seems that these
gadgets became an essential necessity of day-to-day life. People are using new …

Comprehensive review and analysis of anti-malware apps for smartphones

M Talal, AA Zaidan, BB Zaidan, OS Albahri… - Telecommunication …, 2019 - Springer
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …

Droiddetector: android malware characterization and detection using deep learning

Z Yuan, Y Lu, Y Xue - Tsinghua Science and Technology, 2016 - ieeexplore.ieee.org
Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android
has been the most popular mobile operating system since 2012. However, owing to the …

PermPair: Android Malware Detection Using Permission Pairs

A Arora, SK Peddoju, M Conti - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The Android smartphones are highly prone to spreading the malware due to intrinsic
feebleness that permits an application to access the internal resources when the user grants …

Consortium blockchain-based malware detection in mobile devices

J Gu, B Sun, X Du, J Wang, Y Zhuang, Z Wang - IEEE Access, 2018 - ieeexplore.ieee.org
To address the problem of detecting malicious codes in malware and extracting the
corresponding evidences in mobile devices, we construct a consortium blockchain …

DroidMalwareDetector: A novel Android malware detection framework based on convolutional neural network

AT Kabakus - Expert Systems with Applications, 2022 - Elsevier
Smartphones have become an integral part of our daily lives thanks to numerous reasons.
While benefitting from what they offer, it is critical to be aware of the existence of malware in …

A TAN based hybrid model for android malware detection

R Surendran, T Thomas, S Emmanuel - Journal of Information Security and …, 2020 - Elsevier
Android devices are very popular because of their availability at reasonable prices.
However, there is a rapid rise of malware applications in Android platform in the recent past …

Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects

S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian… - Proceedings of the …, 2019 - dl.acm.org
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and
vulnerable certificate verification, seriously threaten software security. The vision of …

Constructing features for detecting android malicious applications: issues, taxonomy and directions

W Wang, M Zhao, Z Gao, G Xu, H Xian, Y Li… - IEEE …, 2019 - ieeexplore.ieee.org
The number of applications (apps) available for smart devices or Android based IoT (Internet
of Things) has surged dramatically over the past few years. Meanwhile, the volume of ill …

Collusive data leak and more: Large-scale threat analysis of inter-app communications

A Bosu, F Liu, D Yao, G Wang - Proceedings of the 2017 ACM on Asia …, 2017 - dl.acm.org
Inter-Component Communication (ICC) provides a message passing mechanism for data
exchange between Android applications. It has been long believed that inter-app ICCs can …