A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

[HTML][HTML] The Android malware detection systems between hope and reality

K Bakour, HM Ünver, R Ghanem - SN applied sciences, 2019 - Springer
The widespread use of Android-based smartphones made it an important target for
malicious applications' developers. So, a large number of frameworks have been proposed …

[PDF][PDF] A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection.

MZ Mas' ud, S Sahib, MF Abdollah, SR Selamat… - Int. J. Netw …, 2017 - ijns.jalaxy.com.tw
In recent years, mobile device technology has become an important necessity in our
community at large. The ability of the mobile technology today has become more similar to …

TL‐GNN: Android Malware Detection Using Transfer Learning

A Raza, ZH Qaisar, N Aslam, M Faheem… - Applied AI …, 2023 - Wiley Online Library
Malware growth has accelerated due to the widespread use of Android applications.
Android smartphone attacks have increased due to the widespread use of these devices …

Android malware detection system: a machine learning and deep learning based multilayered approach

MS Hossain, MH Riaz - … Computing & Optimization: Proceedings of the 4th …, 2022 - Springer
In our growing world of technology, mobile phones have become one of the most used
devices. From the very beginning, Android has become the most popular Operating system …

Ensemble method for mobile malware detection using n-gram sequences of system calls

NAM Ariff, MZ Mas' ud, N Bahaman… - International …, 2021 - search.proquest.com
Mobile device has become an essential tool among the community across the globe and
has turned into a necessity in daily life. An extensive usage of mobile devices for everyday …

[图书][B] Efficient permission-aware analysis of android apps

A Sadeghi - 2018 - search.proquest.com
Permissions are the cornerstone for Android security model, as they enable secure access
to sensitive resources of the phone. Consequently, improper use of Android permission …

A systematic mapping on security threats in mobile devices

A Lacerda, R de Queiroz… - … Internet Technologies and …, 2015 - ieeexplore.ieee.org
The increase in the use of mobile devices and the large amount of sensitive information that
they store make them valuable targets for cybercriminals. In this work, we use the systematic …

Análise de Aplicativos no Android utilizando Traços de Execução

R Polisciuc, L Albini, A Grégio, L Bona - Anais do XX Simpósio …, 2020 - sol.sbc.org.br
O Android é o sistema operacional mais utilizado por dispositivos móveis no mundo. Esse
fato tem atraído cada vez mais desenvolvedores para a plataforma devido a sua …

[PDF][PDF] OVERVIEW ON IDENTIFICATION OF MARKS OF SUBSCRIBER SECRET LOCATION TRACKING IN WIRELESS COMMUNICATIONS NETWORKS.

M DMITRY, Z IGOR, Z Alexander… - Journal of Theoretical …, 2015 - researchgate.net
As mobile devices are getting an integral part of our everyday life they store and process
data that can be of great importance for the user. Another problem with the development of …