Angora: Efficient fuzzing by principled search

P Chen, H Chen - 2018 IEEE Symposium on Security and …, 2018 - ieeexplore.ieee.org
Fuzzing is a popular technique for finding software bugs. However, the performance of the
state-of-the-art fuzzers leaves a lot to be desired. Fuzzers based on symbolic execution …

PermPair: Android Malware Detection Using Permission Pairs

A Arora, SK Peddoju, M Conti - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The Android smartphones are highly prone to spreading the malware due to intrinsic
feebleness that permits an application to access the internal resources when the user grants …

Deeprefiner: Multi-layer android malware detection system applying deep neural networks

K Xu, Y Li, RH Deng, K Chen - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
As malicious behaviors vary significantly across mobile malware, it is challenging to detect
malware both efficiently and effectively. Also due to the continuous evolution of malicious …

Droidevolver: Self-evolving android malware detection system

K Xu, Y Li, R Deng, K Chen, J Xu - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Given the frequent changes in the Android framework and the continuous evolution of
Android malware, it is challenging to detect malware over time in an effective and scalable …

Diane: Identifying fuzzing triggers in apps to generate under-constrained inputs for iot devices

N Redini, A Continella, D Das… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices have rooted themselves in the everyday life of billions of
people. Thus, researchers have applied automated bug finding techniques to improve their …

Monet: a user-oriented behavior-based malware variants detection system for android

M Sun, X Li, JCS Lui, RTB Ma… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Android, the most popular mobile OS, has around 78% of the mobile market share. Due to its
popularity, it attracts many malware attacks. In fact, people have discovered around 1 million …

{CacheD}: Identifying {Cache-Based} timing channels in production software

S Wang, P Wang, X Liu, D Zhang, D Wu - 26th USENIX security …, 2017 - usenix.org
Side-channel attacks recover secret information by analyzing the physical implementation of
cryptosystems based on non-functional computational characteristics, eg time, power, and …

EveDroid: Event-aware Android malware detection against model degrading for IoT devices

T Lei, Z Qin, Z Wang, Q Li, D Ye - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
With the proliferation of the smart Internet of Things (IoT) devices based on Android system,
malicious Android applications targeting for IoT devices have received more and more …

Jucify: A step towards android code unification for enhanced static analysis

J Samhi, J Gao, N Daoudi, P Graux, H Hoyez… - Proceedings of the 44th …, 2022 - dl.acm.org
Native code is now commonplace within Android app packages where it co-exists and
interacts with Dex bytecode through the Java Native Interface to deliver rich app …

Jn-saf: Precise and efficient ndk/jni-aware inter-language static analysis framework for security vetting of android applications with native code

F Wei, X Lin, X Ou, T Chen, X Zhang - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Android allows application developers to use native language (C/C++) to implement a part
or the complete program. Recent research and our own statistics show that native payloads …