Constructing features for detecting android malicious applications: issues, taxonomy and directions

W Wang, M Zhao, Z Gao, G Xu, H Xian, Y Li… - IEEE …, 2019 - ieeexplore.ieee.org
The number of applications (apps) available for smart devices or Android based IoT (Internet
of Things) has surged dramatically over the past few years. Meanwhile, the volume of ill …

DroidEnsemble: Detecting Android malicious applications with ensemble of string and structural static features

W Wang, Z Gao, M Zhao, Y Li, J Liu, X Zhang - IEEE Access, 2018 - ieeexplore.ieee.org
Android platform has dominated the operating system of mobile devices. However, the
dramatic increase of Android malicious applications (malapps) has caused serious software …

Detecting malicious applications using system services request behavior

M Salehi, M Amini, B Crispo - Proceedings of the 16th EAI International …, 2019 - dl.acm.org
Widespread growth in Android malware stimulates security researchers to propose different
methods for analyzing and detecting malicious behaviors in applications. Nevertheless …

[PDF][PDF] A Novel Technique to Secure Inter-Process Communication

AEM Eljialy, S Ahmad - IJCSNS, 2022 - researchgate.net
Interprocess communication (IPC) is the interface for communication between different
programs. Communication occurs through message transfer. We gave a model for security …

Maintaining Root via Custom Android Kernel Across Over-The-Air Upgrade

H Zucheng, L Lu, L Yuanzhang, Z Yu… - … and Architectures for …, 2018 - Springer
People can obtain the highest privileges and control devices by Android root. However, an
Android phone has been rooted, it is difficult for the user to update the Android system …

[PDF][PDF] An Attack-Defense Model for the Binder on the Android Kernel Level

M Salehi, MH Tadayon, F Daryabar - International Journal of …, 2017 - journal.itrc.ac.ir
In this paper, we consider to seek vulnerabilities and we conduct possible attacks on the
crucial and essential parts of Android OSs architecture including the framework and the …

[PDF][PDF] Privacy Protection on Mobile Devices

L ARON - 2017 - theses.cz
This thesis analyses privacy protection on mobile devices and presents the method for
protecting these data against information leakage. The security is focused on using the …