Evaluation of android malware detection based on system calls
With Android being the most widespread mobile platform, protecting it against malicious
applications is essential. Android users typically install applications from large remote …
applications is essential. Android users typically install applications from large remote …
Android malware detection based on factorization machine
As the popularity of Android smart phones has increased in recent years, so too has the
number of malicious applications. Due to the potential for data theft that mobile phone users …
number of malicious applications. Due to the potential for data theft that mobile phone users …
DroidDeep: using Deep Belief Network to characterize and detect android malware
X Su, W Shi, X Qu, Y Zheng, X Liu - Soft Computing, 2020 - Springer
Android operating system and corresponding applications (app) are becoming increasingly
popular, because the characteristics (open source, support the third-party app markets, etc.) …
popular, because the characteristics (open source, support the third-party app markets, etc.) …
Android malware detection based on system calls analysis and CNN classification
A Abderrahmane, G Adnane, C Yacine… - 2019 IEEE wireless …, 2019 - ieeexplore.ieee.org
Android is the most used mobile operating system in the world with two billion monthly active
users in May 2017 [1]. Provided by Google, to be used on a multitude of smartphones …
users in May 2017 [1]. Provided by Google, to be used on a multitude of smartphones …
[PDF][PDF] Android malware detection based on system calls
With Android being the most widespread mobile platform, protecting it against malicious
applications is essential. Android users typically install applications from large remote …
applications is essential. Android users typically install applications from large remote …
[PDF][PDF] Search and Retrieval in Semantic-Structural Representations of Novel Malware.
In this study, we present a novel representation for binary programs which captures
semantic similarity and structural properties. This representation enables the search and …
semantic similarity and structural properties. This representation enables the search and …
On the threat of metastability in an asynchronous fault-tolerant clock generation scheme
Due to their handshake-based flow control, asynchronous circuits generally do not suffer
from metastability issues as much as synchronous circuits do. We will show, however, that …
from metastability issues as much as synchronous circuits do. We will show, however, that …
A novel feature representation for malware classification
J Musgrave, T Messay-Kebede, D Kapp… - arxiv preprint arxiv …, 2022 - arxiv.org
In this study we have presented a novel feature representation for malicious programs that
can be used for malware classification. We have shown how to construct the features in a …
can be used for malware classification. We have shown how to construct the features in a …
Witnessability of undecidable problems
Many problems in programming language theory and formal methods are undecidable, so
they cannot be solved precisely. Practical techniques for dealing with undecidable problems …
they cannot be solved precisely. Practical techniques for dealing with undecidable problems …
Pruning, pushdown exception-flow analysis
Statically reasoning in the presence of exceptions and about the effects of exceptions is
challenging: exception-flows are mutually determined by traditional control-flow and points …
challenging: exception-flows are mutually determined by traditional control-flow and points …