Malicious application detection in android—a systematic literature review
Context: In last decade, due to tremendous usage of smart phones it seems that these
gadgets became an essential necessity of day-to-day life. People are using new …
gadgets became an essential necessity of day-to-day life. People are using new …
Comprehensive review and analysis of anti-malware apps for smartphones
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …
largely scattered. The available options and gaps in this research area must be analysed to …
[HTML][HTML] Automated repair of resource leaks in Android applications
Resource leaks–a program does not release resources it previously acquired–are a
common kind of bug in Android applications. Even with the help of existing techniques to …
common kind of bug in Android applications. Even with the help of existing techniques to …
Interactive visualization toolbox to detect sophisticated android malware
GR Santhanam, B Holland, S Kothari… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
Detecting zero-day sophisticated malware is like searching for a needle in the haystack, not
knowing what the needle looks like. This paper describes Android Malicious Flow …
knowing what the needle looks like. This paper describes Android Malicious Flow …
On the threat of metastability in an asynchronous fault-tolerant clock generation scheme
Due to their handshake-based flow control, asynchronous circuits generally do not suffer
from metastability issues as much as synchronous circuits do. We will show, however, that …
from metastability issues as much as synchronous circuits do. We will show, however, that …
Effect-driven flow analysis
Traditional machine-based static analyses use a worklist algorithm to explore the analysis
state space, and compare each state in the worklist against a set of seen states as part of …
state space, and compare each state in the worklist against a set of seen states as part of …
Defending android applications availability
There are over a billion devices running the Android operating system. It is being used
globally in personal, public, private and government organizations. Device and application …
globally in personal, public, private and government organizations. Device and application …
Permission-based analysis of android applications using categorization and deep learning scheme
A Hamidreza, N Mohammed - MATEC Web of Conferences, 2019 - matec-conferences.org
As mobile devices grow in popularity, they have become indispensable in people's daily
lives, kee** us connected to social networks, breaking news, and the entire Internet. While …
lives, kee** us connected to social networks, breaking news, and the entire Internet. While …
Pruning, pushdown exception-flow analysis
Statically reasoning in the presence of exceptions and about the effects of exceptions is
challenging: exception-flows are mutually determined by traditional control-flow and points …
challenging: exception-flows are mutually determined by traditional control-flow and points …