Rebooting research on detecting repackaged android apps: Literature review and benchmark

L Li, TF Bissyandé, J Klein - IEEE Transactions on Software …, 2019 - ieeexplore.ieee.org
Repackaging is a serious threat to the Android ecosystem as it deprives app developers of
their benefits, contributes to spreading malware on users' devices, and increases the …

A survey and evaluation of android-based malware evasion techniques and detection frameworks

P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun… - Information, 2023 - mdpi.com
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …

Enhancing state-of-the-art classifiers with api semantics to detect evolved android malware

X Zhang, Y Zhang, M Zhong, D Ding, Y Cao… - Proceedings of the …, 2020 - dl.acm.org
Machine learning (ML) classifiers have been widely deployed to detect Android malware,
but at the same time the application of ML classifiers also faces an emerging problem. The …

Android malware familial classification and representative sample selection via frequent subgraph analysis

M Fan, J Liu, X Luo, K Chen, Z Tian… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The rapid increase in the number of Android malware poses great challenges to anti-
malware systems, because the sheer number of malware samples overwhelms malware …

Understanding android app piggybacking: A systematic study of malicious code grafting

L Li, D Li, TF Bissyandé, J Klein… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
The Android packaging model offers ample opportunities for malware writers to piggyback
malicious code in popular apps, which can then be easily spread to a large user base …

Understanding android obfuscation techniques: A large-scale investigation in the wild

S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu… - Security and privacy in …, 2018 - Springer
Program code is a valuable asset to its owner. Due to the easy-to-reverse nature of Java,
code protection for Android apps is of particular importance. To this end, code obfuscation is …

Obfuscation-resilient android malware analysis based on complementary features

C Gao, M Cai, S Yin, G Huang, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Existing Android malware detection methods are usually hard to simultaneously resist
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …

Structural attack against graph based android malware detection

K Zhao, H Zhou, Y Zhu, X Zhan, K Zhou, J Li… - Proceedings of the …, 2021 - dl.acm.org
Malware detection techniques achieve great success with deeper insight into the semantics
of malware. Among existing detection techniques, function call graph (FCG) based methods …

Dapasa: detecting android piggybacked apps through sensitive subgraph analysis

M Fan, J Liu, W Wang, H Li, Z Tian… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the exponential growth of smartphone adoption, malware attacks on smartphones have
resulted in serious threats to users, especially those on popular platforms, such as Android …

Can we trust the privacy policies of android apps?

L Yu, X Luo, X Liu, T Zhang - 2016 46th Annual IEEE/IFIP …, 2016 - ieeexplore.ieee.org
Recent years have witnessed the sharp increase of malicious apps that steal users' personal
information. To address users' concerns about privacy risks, more and more apps are …