Consortium blockchain-based malware detection in mobile devices

J Gu, B Sun, X Du, J Wang, Y Zhuang, Z Wang - IEEE Access, 2018 - ieeexplore.ieee.org
To address the problem of detecting malicious codes in malware and extracting the
corresponding evidences in mobile devices, we construct a consortium blockchain …

Understanding the evolution of android app vulnerabilities

J Gao, L Li, P Kong, TF Bissyandé… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The Android ecosystem today is a growing universe of a few billion devices, hundreds of
millions of users and millions of applications targeting a wide range of activities where …

An app based on static analysis for android ransomware

M Kanwal, S Thakur - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Ransomware has become the most threatening malware which takes out money from their
victims by threatening them that they have been caught accessing illegal websites or in …

Borrowing your enemy's arrows: the case of code reuse in android via direct inter-app code invocation

J Gao, L Li, P Kong, TF Bissyandé, J Klein - Proceedings of the 28th …, 2020 - dl.acm.org
The Android ecosystem offers different facilities to enable communication among app
components and across apps to ensure that rich services can be composed through …

Towards automated android app collusion detection

IM Asavoae, J Blasco, TM Chen, HK Kalutarage… - arXiv preprint arXiv …, 2016 - arxiv.org
Android OS supports multiple communication methods between apps. This opens the
possibility to carry out threats in a collaborative fashion, cf the Soundcomber example from …

[HTML][HTML] Towards a threat assessment framework for apps collusion

HK Kalutarage, HN Nguyen, SA Shaikh - Telecommunication systems, 2017 - Springer
App collusion refers to two or more apps working together to achieve a malicious goal that
they otherwise would not be able to achieve individually. The permissions based security …

Lifting inter-app data-flow analysis to large app sets

F Sattler, A von Rhein, T Berger, NS Johansson… - Automated Software …, 2018 - Springer
Mobile apps process increasing amounts of private data, giving rise to privacy concerns.
Such concerns do not arise only from single apps, which might—accidentally or intentionally …

Analysis strategies for configurable systems

A von Rhein - 2016 - opus4.kobv.de
A configurable system enables users to derive individual system variants based on a
selection of configuration options. To cope with the often huge number of possible …

Practical precise taint-flow static analysis for android app sets

W Klieber, L Flynn, W Snavely, M Zheng - Proceedings of the 13th …, 2018 - dl.acm.org
Colluding apps, or a combination of a malicious app and leaky app, can use intents
(messages sent to Android app components) to exfiltrate sensitive or private information …

Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case

IM Asăvoae, J Blasco, TM Chen, HK Kalutarage… - Data Analytics and …, 2017 - Springer
Malware has been a major problem in desktop computing for decades. With the recent trend
towards mobile computing, malware is moving rapidly to smartphone platforms.“Total mobile …