An effective end-to-end android malware detection method

H Zhu, H Wei, L Wang, Z Xu, VS Sheng - Expert Systems with Applications, 2023 - Elsevier
Android has rapidly become the most popular mobile operating system because of its open
source, rich hardware selectivity, and millions of applications (Apps). Meanwhile, the open …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Privacy-aware data publishing and integration for collaborative service recommendation

C Yan, X Cui, L Qi, X Xu, X Zhang - IEEE Access, 2018 - ieeexplore.ieee.org
Item-based collaborative filtering (ie, ICF) technique has been widely recruited to make
service recommendations in the big data environment. However, the ICF technique only …

Responding to living-off-the-land tactics using just-in-time memory forensics (JIT-MF) for android

J Bellizzi, M Vella, C Colombo… - arxiv preprint arxiv …, 2021 - arxiv.org
Digital investigations of stealthy attacks on Android devices pose particular challenges to
incident responders. Whereas consequential late detection demands accurate and …

Towards Measuring Apps' Privacy-Friendliness

N Momen - 2018 - diva-portal.org
Today's phone could be described as a charismatic tool that has the ability to keep human
beings captivated for a considerable amount of their precious time. Users remain in the …

Target: Category-based android malware detection revisited

J Lin, X Zhao, H Li - Proceedings of the Australasian Computer Science …, 2017 - dl.acm.org
Smartphones are becoming increasingly popular in daily routines around the world.
However, malware in smartphones is getting more prevalent, and will introduce potential …

[ΒΙΒΛΙΟ][B] Efficient permission-aware analysis of android apps

A Sadeghi - 2018 - search.proquest.com
Permissions are the cornerstone for Android security model, as they enable secure access
to sensitive resources of the phone. Consequently, improper use of Android permission …

Measuring Apps' Privacy-Friendliness: Introducing transparency to apps' data access behavior

N Momen - 2020 - diva-portal.org
Mobile apps brought unprecedented convenience to everyday life, and nowadays, hardly
any interactive service exists without having an interface through an app. The rich …

Quantitave dynamic taint analysis of privacy leakage in android arabic apps

A Youssef, AF Shosha - … of the 12th International Conference on …, 2017 - dl.acm.org
Android smartphones are ubiquitous all over the world, and organizations that turn profits
out of data mining user personal information are on the rise. Many users are not aware of the …

PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices

SI Alqahtani, S Li - Proceedings of the 12th International Conference on …, 2017 - dl.acm.org
Mobile devices are ubiquitous in today's digital world. While people enjoy the convenience
brought by mobile devices, it has been proven that many mobile apps leak personal …