A systematic literature review on source code similarity measurement and clone detection: Techniques, applications, and challenges

M Zakeri-Nasrabadi, S Parsa, M Ramezani… - Journal of Systems and …, 2023 - Elsevier
Measuring and evaluating source code similarity is a fundamental software engineering
activity that embraces a broad range of applications, including but not limited to code …

Rebooting research on detecting repackaged android apps: Literature review and benchmark

L Li, TF Bissyandé, J Klein - IEEE Transactions on Software …, 2019 - ieeexplore.ieee.org
Repackaging is a serious threat to the Android ecosystem as it deprives app developers of
their benefits, contributes to spreading malware on users' devices, and increases the …

An effective end-to-end android malware detection method

H Zhu, H Wei, L Wang, Z Xu, VS Sheng - Expert Systems with Applications, 2023 - Elsevier
Android has rapidly become the most popular mobile operating system because of its open
source, rich hardware selectivity, and millions of applications (Apps). Meanwhile, the open …

GHGDroid: Global heterogeneous graph-based android malware detection

L Shen, M Fang, J Xu - Computers & Security, 2024 - Elsevier
As the most popular mobile platform, Android has become the major attack target of
malware, and thus there is an urgent need to effectively thwart them. Recently, the graph …

Graph embedding based familial analysis of android malware using unsupervised learning

M Fan, X Luo, J Liu, M Wang, C Nong… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
The rapid growth of Android malware has posed severe security threats to smartphone
users. On the basis of the familial trait of Android malware observed by previous work, the …

Comparison and evaluation of clone detection techniques with different code representations

Y Wang, Y Ye, Y Wu, W Zhang… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
As one of bad smells in code, code clones may increase the cost of software maintenance
and the risk of vulnerability propagation. In the past two decades, numerous clone detection …

Malware-on-the-brain: Illuminating malware byte codes with images for malware classification

F Zhong, Z Chen, M Xu, G Zhang, D Yu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Malware is a piece of software that was written with the intent of doing harm to data, devices,
or people. Since a number of new malware variants can be generated by reusing codes …

Detection of evasive Android malware using EigenGCN

TS John, T Thomas, S Emmanuel - Journal of Information Security and …, 2024 - Elsevier
Recently there is an upsurge in Android malware that use obfuscation and repackaging
techniques for evasion. Malware may also combine both these techniques to create stealthy …

Ctdroid: leveraging a corpus of technical blogs for android malware analysis

M Fan, X Luo, J Liu, C Nong… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The rapid growth of Android malware results in a large body of approaches devoted to
malware analysis by leveraging machine learning algorithms. However, the effectiveness of …

Semi-supervised two-phase familial analysis of Android malware with normalized graph embedding

Q Li, Q Hu, Y Qi, S Qi, X Liu, P Gao - Knowledge-Based Systems, 2021 - Elsevier
With the widespread use of smartphones, Android malware has posed serious threats to its
security. Given the explosive growth of Android malware variants, detecting malware …