Reinforcement learning based adversarial malware example generation against black-box detectors
Recent advances in machine learning offer attractive tools for sophisticated adversaries. An
attacker could transform malware into its adversarial version but retain its malicious …
attacker could transform malware into its adversarial version but retain its malicious …
Dalvik opcode graph based android malware variants detection using global topology features
J Zhang, Z Qin, K Zhang, H Yin, J Zou - IEEE Access, 2018 - ieeexplore.ieee.org
Since Android has become the dominator of smartphone operating system market with a
share of 86.8%, the number of Android malicious applications are increasing rapidly as well …
share of 86.8%, the number of Android malicious applications are increasing rapidly as well …
[HTML][HTML] Android fragmentation in malware detection
Differences between Android versions affect not only application developers but also make
the task of securing Android harder, as it is not easy to keep track of updates. In this paper …
the task of securing Android harder, as it is not easy to keep track of updates. In this paper …
Android applications scanning: The guide
I Almomani, A Khayer - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
The booming of Android technology makes Android users and their devices with all running
applications targeted by many security attackers. These attackers intent to inject malicious …
applications targeted by many security attackers. These attackers intent to inject malicious …
Analysis of Anubis Trojan Attack on Android Banking Application Using Mobile Security Labware.
Mobile banking transactions, especially on the Android platform, are now a method often
used to carry out payment and shop** activities in e-commerce. Security risks in mobile …
used to carry out payment and shop** activities in e-commerce. Security risks in mobile …
Design of an Iterative Method for Malware Detection Using Autoencoders and Hybrid Machine Learning Models
In the evolving cyber threat landscape, one of the most visible and pernicious challenges is
malware activity detection and analysis. Traditional detection and analysis methods face …
malware activity detection and analysis. Traditional detection and analysis methods face …
Android application security scanning process
This chapter presents the security scanning process for Android applications. The aim is to
guide researchers and developers to the core phases/steps required to analyze Android …
guide researchers and developers to the core phases/steps required to analyze Android …
Ransomware Detection Techniques Using Machine Learning Methods
Considering the rising frequency and refinement of ransomware attacks, there is a rising
significance for dynamic and successful methods of detection and mitigation. Conventional …
significance for dynamic and successful methods of detection and mitigation. Conventional …
An Online Automated Anti-anti-virus Method
L Ma, H Yang, Y Chai, J Fan, W Yang - Inernational Conference on …, 2021 - Springer
In offensive and defensive exercises, the security detection side (red team) conducts
simulated real network attacks from various entry points to the maximum extent in limited …
simulated real network attacks from various entry points to the maximum extent in limited …
Abusing iOS Permissions: A Security Perspective
F Alanazy, R Saifan, M Al-Akhras… - … Multi-Conference on …, 2024 - ieeexplore.ieee.org
Smartphone users have become accustomed to installing Apps of different categories such
as gaming, business, educational, lifestyle, and many more Apps. However, even with the …
as gaming, business, educational, lifestyle, and many more Apps. However, even with the …