Evaluation of android malware detection based on system calls

M Dimjašević, S Atzeni, I Ugrina… - Proceedings of the 2016 …, 2016 - dl.acm.org
With Android being the most widespread mobile platform, protecting it against malicious
applications is essential. Android users typically install applications from large remote …

Android malware detection based on factorization machine

C Li, K Mills, D Niu, R Zhu, H Zhang, H Kinawi - IEEE Access, 2019 - ieeexplore.ieee.org
As the popularity of Android smart phones has increased in recent years, so too has the
number of malicious applications. Due to the potential for data theft that mobile phone users …

DroidDeep: using Deep Belief Network to characterize and detect android malware

X Su, W Shi, X Qu, Y Zheng, X Liu - Soft Computing, 2020 - Springer
Android operating system and corresponding applications (app) are becoming increasingly
popular, because the characteristics (open source, support the third-party app markets, etc.) …

Android malware detection based on system calls analysis and CNN classification

A Abderrahmane, G Adnane, C Yacine… - 2019 IEEE wireless …, 2019 - ieeexplore.ieee.org
Android is the most used mobile operating system in the world with two billion monthly active
users in May 2017 [1]. Provided by Google, to be used on a multitude of smartphones …

[PDF][PDF] Android malware detection based on system calls

M Dimjaševic, S Atzeni, I Ugrina… - University of Utah, Tech …, 2015 - cs.utah.edu
With Android being the most widespread mobile platform, protecting it against malicious
applications is essential. Android users typically install applications from large remote …

[PDF][PDF] Search and Retrieval in Semantic-Structural Representations of Novel Malware.

J Musgrave, A Campan, TM Kebede, D Kapp… - Adv. Artif. Intell. Mach …, 2024 - oajaiml.com
In this study, we present a novel representation for binary programs which captures
semantic similarity and structural properties. This representation enables the search and …

On the threat of metastability in an asynchronous fault-tolerant clock generation scheme

G Fuchs, M Függer, A Steininger - 2009 15th IEEE Symposium …, 2009 - ieeexplore.ieee.org
Due to their handshake-based flow control, asynchronous circuits generally do not suffer
from metastability issues as much as synchronous circuits do. We will show, however, that …

A novel feature representation for malware classification

J Musgrave, T Messay-Kebede, D Kapp… - arxiv preprint arxiv …, 2022 - arxiv.org
In this study we have presented a novel feature representation for malicious programs that
can be used for malware classification. We have shown how to construct the features in a …

Witnessability of undecidable problems

S Ding, Q Zhang - Proceedings of the ACM on Programming Languages, 2023 - dl.acm.org
Many problems in programming language theory and formal methods are undecidable, so
they cannot be solved precisely. Practical techniques for dealing with undecidable problems …

Pruning, pushdown exception-flow analysis

S Liang, W Sun, M Might, A Keep… - 2014 IEEE 14th …, 2014 - ieeexplore.ieee.org
Statically reasoning in the presence of exceptions and about the effects of exceptions is
challenging: exception-flows are mutually determined by traditional control-flow and points …