A large-scale investigation into geodifferences in mobile apps

R Kumar, A Virkud, RS Raman, A Prakash… - 31st USENIX Security …, 2022 - usenix.org
Recent studies on the web ecosystem have been raising alarms on the increasing
geodifferences in access to Internet content and services due to Internet censorship and …

Efficient query-based attack against ML-based Android malware detection under zero knowledge setting

P He, Y Xia, X Zhang, S Ji - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The widespread adoption of the Android operating system has made malicious Android
applications an appealing target for attackers. Machine learning-based (ML-based) Android …

[PDF][PDF] Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers.

MH Meng, Q Zhang, G Xia, Y Zheng, Y Zhang, G Bai… - NDSS, 2023 - baigd.github.io
Ever since its genesis, Android has enabled apps to access data and services on mobile
devices. This however involves a wide variety of user-unresettable identifiers (UUIs), eg, the …

F2DC: Android malware classification based on raw traffic and neural networks

T Lu, J Wang - Computer Networks, 2022 - Elsevier
Given the growing threat of Android malware, its family classification is important for
identifying new variants, building robust signatures, assessing threat levels, and planning …

Towards stalkerware detection with precise warnings

Y Han, KA Roundy, A Tamersoy - … of the 37th Annual Computer Security …, 2021 - dl.acm.org
Stalkerware enables individuals to conduct covert surveillance on a targeted person's
device. Android devices are a particularly fertile ground for stalkerware, most of which spy …

Libhunter: An unsupervised approach for third-party library detection without prior knowledge

H Cui, G Meng, Y Li, Y Li, Y Zhang… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Third-party libraries (TPLs) are a significant component of mobile apps. They provide
various functionalities, and developers employ them to facilitate app development. TPL …

An automated pipeline for privacy leak analysis of android applications

Y Zhou - 2021 36th IEEE/ACM International Conference on …, 2021 - ieeexplore.ieee.org
We propose an automated pipeline for analyzing privacy leaks in Android applications. By
using a combination of dynamic and static analysis, we validate the results from each other …

A Large-Scale Privacy Assessment of Android Third-Party SDKs

MH Meng, C Yan, Y Hao, Q Zhang, Z Wang… - arXiv preprint arXiv …, 2024 - arxiv.org
Third-party Software Development Kits (SDKs) are widely adopted in Android app
development, to effortlessly accelerate development pipelines and enhance app …

Connection Type Identification and Uplink Speed Estimation of Malware Infected Hosts

X Huang, S Mochizuki, K Yoshioka - Journal of Information …, 2022 - jstage.jst.go.jp
IoT malware Mirai and its variants continue to evolve and their activities consume network
resources, particularly radio resources. This paper proposes a method to identify connection …

Exploiting App Differences for Security Analysis of Multi-Geo Mobile Ecosystems

R Kumar - 2023 - deepblue.lib.umich.edu
Billions of users worldwide access essential Internet services such as banking, education,
and healthcare through mobile apps on their phones. This growth in mobile use is fueled by …