P He, Y Xia, X Zhang, S Ji - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The widespread adoption of the Android operating system has made malicious Android applications an appealing target for attackers. Machine learning-based (ML-based) Android …
Ever since its genesis, Android has enabled apps to access data and services on mobile devices. This however involves a wide variety of user-unresettable identifiers (UUIs), eg, the …
Given the growing threat of Android malware, its family classification is important for identifying new variants, building robust signatures, assessing threat levels, and planning …
Stalkerware enables individuals to conduct covert surveillance on a targeted person's device. Android devices are a particularly fertile ground for stalkerware, most of which spy …
H Cui, G Meng, Y Li, Y Li, Y Zhang… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Third-party libraries (TPLs) are a significant component of mobile apps. They provide various functionalities, and developers employ them to facilitate app development. TPL …
Y Zhou - 2021 36th IEEE/ACM International Conference on …, 2021 - ieeexplore.ieee.org
We propose an automated pipeline for analyzing privacy leaks in Android applications. By using a combination of dynamic and static analysis, we validate the results from each other …
MH Meng, C Yan, Y Hao, Q Zhang, Z Wang… - arXiv preprint arXiv …, 2024 - arxiv.org
Third-party Software Development Kits (SDKs) are widely adopted in Android app development, to effortlessly accelerate development pipelines and enhance app …
X Huang, S Mochizuki, K Yoshioka - Journal of Information …, 2022 - jstage.jst.go.jp
IoT malware Mirai and its variants continue to evolve and their activities consume network resources, particularly radio resources. This paper proposes a method to identify connection …
Billions of users worldwide access essential Internet services such as banking, education, and healthcare through mobile apps on their phones. This growth in mobile use is fueled by …