The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures

A Yazdinejad, B Zolfaghari, A Azmoodeh… - Applied Sciences, 2021 - mdpi.com
In recent years, Smart Farming (SF) and Precision Agriculture (PA) have attracted attention
from both the agriculture industry as well as the research community. Altogether, SF and PA …

Machine learning aided Android malware classification

N Milosevic, A Dehghantanha, KKR Choo - Computers & Electrical …, 2017 - Elsevier
The widespread adoption of Android devices and their capability to access significant
private and confidential information have resulted in these devices being targeted by …

Droidmat: Android malware detection through manifest and api calls tracing

DJ Wu, CH Mao, TE Wei, HM Lee… - 2012 Seventh Asia joint …, 2012 - ieeexplore.ieee.org
Recently, the threat of Android malware is spreading rapidly, especially those repackaged
Android malware. Although understanding Android malware using dynamic analysis can …

Crowdroid: behavior-based malware detection system for android

I Burguera, U Zurutuza, S Nadjm-Tehrani - … of the 1st ACM workshop on …, 2011 - dl.acm.org
The sharp increase in the number of smartphones on the market, with the Android platform
posed to becoming a market leader makes the need for malware analysis on this platform an …

A survey on security for mobile devices

M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …

An android application sandbox system for suspicious software detection

T Bläsing, L Batyuk, AD Schmidt… - … on Malicious and …, 2010 - ieeexplore.ieee.org
Smartphones are steadily gaining popularity, creating new application areas as their
capabilities increase in terms of computational power, sensors and communication …

Android permissions: a perspective combining risks and benefits

BP Sarma, N Li, C Gates, R Potharaju… - Proceedings of the 17th …, 2012 - dl.acm.org
The phenomenal growth of the Android platform in the past few years has made it a lucrative
target of malicious application (app) developers. There are numerous instances of malware …

A hybrid approach of mobile malware detection in Android

F Tong, Z Yan - Journal of Parallel and Distributed computing, 2017 - Elsevier
Android security incidents occurred frequently in recent years. This motivates us to study
mobile app security, especially in Android open mobile operating system. In this paper, we …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …