Malicious application detection in android—a systematic literature review
Context: In last decade, due to tremendous usage of smart phones it seems that these
gadgets became an essential necessity of day-to-day life. People are using new …
gadgets became an essential necessity of day-to-day life. People are using new …
Measuring and modeling the label dynamics of online {Anti-Malware} engines
VirusTotal provides malware labels from a large set of anti-malware engines, and is heavily
used by researchers for malware annotation and system evaluation. Since different engines …
used by researchers for malware annotation and system evaluation. Since different engines …
Understanding android obfuscation techniques: A large-scale investigation in the wild
Program code is a valuable asset to its owner. Due to the easy-to-reverse nature of Java,
code protection for Android apps is of particular importance. To this end, code obfuscation is …
code protection for Android apps is of particular importance. To this end, code obfuscation is …
A close look at a daily dataset of malware samples
The number of unique malware samples is growing out of control. Over the years, security
companies have designed and deployed complex infrastructures to collect and analyze this …
companies have designed and deployed complex infrastructures to collect and analyze this …
Machine-Learning based analysis and classification of Android malware signatures
Multi-scanner Antivirus (AV) systems are often used for detecting Android malware since the
same piece of software can be checked against multiple different AV engines. However, in …
same piece of software can be checked against multiple different AV engines. However, in …
The Effect of the Ransomware Dataset Age on the Detection Accuracy of Machine Learning Models
QM Yaseen - Information, 2023 - mdpi.com
Several supervised machine learning models have been proposed and used to detect
Android ransomware. These models were trained using different datasets from different …
Android ransomware. These models were trained using different datasets from different …
Re-measuring the label dynamics of online anti-malware engines from millions of samples
VirusTotal is the most widely used online scanning service in both academia and industry.
However, it is known that the results returned by antivirus engines are often inconsistent and …
However, it is known that the results returned by antivirus engines are often inconsistent and …
MalNet: A binary-centric network-level profiling of IoT malware
Where are the IoT C2 servers located? What vulnerabilities does IoT malware try to exploit?
What DDoS attacks are launched in practice? In this work, we conduct a large scale study to …
What DDoS attacks are launched in practice? In this work, we conduct a large scale study to …
Advances in computer communication and computational sciences
The IC4S is a major multidisciplinary conference organized with the objective of bringing
together researchers, developers, and practitioners from academia and industry working in …
together researchers, developers, and practitioners from academia and industry working in …
CrowdNet: identifying large-scale malicious attacks over android kernel structures
While malicious attacks in Android devices are growing, machine learning-based malware
prediction has become time-consuming and space-consuming. Open-source parallel …
prediction has become time-consuming and space-consuming. Open-source parallel …