A survey and evaluation of android-based malware evasion techniques and detection frameworks

P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun… - Information, 2023 - mdpi.com
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …

The rise of obfuscated Android malware and impacts on detection methods

WF Elsersy, A Feizollah, NB Anuar - PeerJ Computer Science, 2022 - peerj.com
The various application markets are facing an exponential growth of Android malware. Every
day, thousands of new Android malware applications emerge. Android malware hackers …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Measuring code reuse in Android apps

H Gonzalez, N Stakhanova… - 2016 14th Annual …, 2016 - ieeexplore.ieee.org
The appearance of the Android platform and its popularity has resulted in a sharp rise in the
number of reported vulnerabilities and consequently in the number of mobile threats …

[PDF][PDF] A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks. Information 2023, 14, 374

P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun… - 2023 - academia.edu
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …

[图书][B] Efficient permission-aware analysis of android apps

A Sadeghi - 2018 - search.proquest.com
Permissions are the cornerstone for Android security model, as they enable secure access
to sensitive resources of the phone. Consequently, improper use of Android permission …

Research on Secure Coding and Weakness for Implementation of Android-based Dynamic Class Loading

H Kim, JY Choi - Journal of Korea Multimedia Society, 2016 - koreascience.kr
Android application is vulnerable to reverse engineering attack. And by this, it is easy to
extract significant module from source code and repackage it. To prevent this problem …

Dynamic detection of malicious code on android based on improved multi-feature gaussian kernel

Q Yu, X Luo, Z Wang - Advances in Natural Computation, Fuzzy Systems …, 2020 - Springer
In recent years, with the increasing demand for mobile Internet, smartphones represented by
the Android system begin to play an increasingly important role in people's daily life. Due to …

[PDF][PDF] Code clone detection in obfuscated Android apps

A Foroughipour - 2021 - harvest.usask.ca
The Android operating system has long become one of the main global smartphone
operating systems. Both developers and malware authors often reuse code to expedite the …

[PDF][PDF] Spoof-of-Work

D Ziegler, B Prünster, M Alexander, C Kollmann - 2018 - pdfs.semanticscholar.org
Mobile mining of cryptocurrencies, without relying on CPU-heavy computations, is a novel
attempt to foster adoption of a token. However, this approach leaves room for attacks. In this …