The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

[图书][B] Adversarial machine learning

Y Vorobeychik, M Kantarcioglu - 2022 - books.google.com
The increasing abundance of large high-quality datasets, combined with significant
technical advances over the last several decades have made machine learning into a major …

Stack overflow considered harmful? the impact of copy&paste on android application security

F Fischer, K Böttinger, H Xiao… - … IEEE symposium on …, 2017 - ieeexplore.ieee.org
Online programming discussion platforms such as Stack Overflow serve as a rich source of
information for software developers. Available information include vibrant discussions and …

Reliable third-party library detection in android and its security applications

M Backes, S Bugiel, E Derr - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Third-party libraries on Android have been shown to be security and privacy hazards by
adding security vulnerabilities to their host apps or by misusing inherited access rights …

Semantics-aware android malware classification using weighted contextual api dependency graphs

M Zhang, Y Duan, H Yin, Z Zhao - … of the 2014 ACM SIGSAC conference …, 2014 - dl.acm.org
The drastic increase of Android malware has led to a strong interest in developing methods
to automate the malware analysis process. Existing automated Android malware detection …

[PDF][PDF] Copperdroid: Automatic reconstruction of android malware behaviors.

K Tam, SJ Khan, A Fattori, L Cavallaro - Ndss, 2015 - core.ac.uk
Mobile devices and their application marketplaces drive the entire economy of the today's
mobile landscape. Android platforms alone have produced staggering revenues, exceeding …

Structural detection of android malware using embedded call graphs

H Gascon, F Yamaguchi, D Arp, K Rieck - … of the 2013 ACM workshop on …, 2013 - dl.acm.org
The number of malicious applications targeting the Android system has literally exploded in
recent years. While the security community, well aware of this fact, has proposed several …

Achieving accuracy and scalability simultaneously in detecting application clones on android markets

K Chen, P Liu, Y Zhang - … of the 36th International Conference on …, 2014 - dl.acm.org
Besides traditional problems such as potential bugs,(smartphone) application clones on
Android markets bring new threats. That is, attackers clone the code from legitimate Android …

Keep me updated: An empirical study of third-party library updatability on android

E Derr, S Bugiel, S Fahl, Y Acar, M Backes - Proceedings of the 2017 …, 2017 - dl.acm.org
Third-party libraries in Android apps have repeatedly been shown to be hazards to the
users' privacy and an amplification of their host apps' attack surface. A particularly …