Detection approaches for android malware: Taxonomy and review analysis

HHR Manzil, SM Naik - Expert Systems with Applications, 2024 - Elsevier
The main objective of this review is to present an in-depth study of Android malware
detection approaches. This article provides a comprehensive survey of 150 studies on …

SeGDroid: An Android malware detection method based on sensitive function call graph learning

Z Liu, R Wang, N Japkowicz, HM Gomes… - Expert Systems with …, 2024 - Elsevier
Malware is still a challenging security problem in the Android ecosystem, as malware is
often obfuscated to evade detection. In such case, semantic behavior feature extraction is …

Mobidroid: A performance-sensitive malware detection system on mobile platform

R Feng, S Chen, X Xie, L Ma, G Meng… - … on Engineering of …, 2019 - ieeexplore.ieee.org
Currently, Android malware detection is mostly performed on the server side against the
increasing number of Android malware. Powerful computing resource gives more …

Multi-label classification for android malware based on active learning

Q Qiao, R Feng, S Chen, F Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The existing malware classification approaches (ie, binary and family classification) can
barely benefit subsequent analysis with their outputs. Even the family classification …

Influencing user's behavior concerning android privacy policy: an overview

M Di, S Nazir, F Deng - Mobile Information Systems, 2021 - Wiley Online Library
The wide‐ranging implementation of Android applications used in various devices, from
smartphones to intelligent television, has made it thought‐provoking for developers. The …

Automatic Detection and Analysis towards Malicious Behavior in IoT Malware

S Li, M Ge, R Feng, X Li, KY Lam - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Our society is rapidly moving towards the digital age, which has led to a sharp increase in
IoT networks and devices. This growth requires more network security professionals, who …

SkillSim: voice apps similarity detection

Z Guo, R Liang, G Meng, K Chen - Cybersecurity, 2023 - Springer
Virtual personal assistants (VPAs), such as Amazon Alexa and Google Assistant, are
software agents designed to perform tasks or provide services to individuals in response to …

Malware phylogeny analysis using data-aware declarative process mining

P Ardimento, ML Bernardi… - 2020 IEEE Conference on …, 2020 - ieeexplore.ieee.org
Mobile phones are currently the main targets of continuous malware attacks. Usually, new
malicious code is generated conveniently changing the existing one. According to this, it …

A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps

W Wang, G Meng, H Wang, K Chen… - … and evolution (ICSME …, 2020 - ieeexplore.ieee.org
Authorship identification is the process of identifying and classifying authors through given
codes. Authorship identification can be used in a wide range of software domains, eg, code …

Data-aware declarative process mining for malware detection

P Ardimento, L Aversano, ML Bernardi… - … Joint Conference on …, 2020 - ieeexplore.ieee.org
Mobile devices have become, in the last years, an essential tool used to perform daily
activities. However, they also have become the target of continuous malware attacks usually …