A survey and evaluation of android-based malware evasion techniques and detection frameworks

P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun… - Information, 2023 - mdpi.com
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …

NCScope: hardware-assisted analyzer for native code in Android apps

H Zhou, S Wu, X Luo, T Wang, Y Zhou… - Proceedings of the 31st …, 2022 - dl.acm.org
More and more Android apps implement their functionalities in native code, so does
malware. Although various approaches have been designed to analyze the native code …

WADIFF: A Differential Testing Framework for WebAssembly Runtimes

S Zhou, M Jiang, W Chen, H Zhou… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
WebAssembly (Wasm) runtime provides a virtual machine that can execute the
WebAssembly modules and is widely used in different areas (eg, browsers, edge computing …

The progress, challenges, and perspectives of directed greybox fuzzing

P Wang, X Zhou, T Yue, P Lin, Y Liu… - … Testing, Verification and …, 2024 - Wiley Online Library
Greybox fuzzing is a scalable and practical approach for software testing. Most greybox
fuzzing tools are coverage‐guided as reaching high code coverage is more likely to find …

AsFuzzer: Differential Testing of Assemblers with Error-Driven Grammar Inference

H Kim, S Kim, J Lee, SK Cha - Proceedings of the 33rd ACM SIGSOFT …, 2024 - dl.acm.org
Assembler is a critical component of the compiler toolchain, which has been less tested than
the other components. Unfortunately, current grammar-based fuzzing techniques suffer from …

[PDF][PDF] RISCVuzz: Discovering Architectural CPU Vulnerabilities via Differential Hardware Fuzzing

F Thomas, L Hetterich, R Zhang, D Weber, L Gerlach… - 2024 - ghostwriteattack.com
The open and extensible RISC-V instruction set architecture marks a significant
advancement in the CPU industry by enabling new vendors to enter the CPU market. RISC …

A High-Coverage and Efficient Instruction-Level Testing Approach for x86 Processors

G Wang, Z Zhu, X Cheng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The processors have long been treated as trusted black boxes for running software.
However, processors may have undocumented instructions and instruction flaws, which …

Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing

T Yue, Y Jin, F Zhang, Z Ning, P Wang… - Proceedings of the 27th …, 2024 - dl.acm.org
Coverage-based greybox fuzzing (CGF) is an efficient technique for detecting vulnerabilities,
but its coverage-feedback mechanism introduces significant overhead in binary-only …

[PDF][PDF] A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks. Information 2023, 14, 374

P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun… - 2023 - academia.edu
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …

BootRIST: Detecting and Isolating Mercurial Cores at the Booting Stage

Y Luo, Y Deng, J Ge, Z Ning, F Zhang - European Symposium on …, 2024 - Springer
With the shrinking of transistor size and their own increasing complexity, CPUs have
become more fault-prone. The mercurial cores, one type of processor failure, can randomly …