Android security assessment: A review, taxonomy and research gap study
Security threats are escalating exponentially posing a serious challenge to mobile platforms,
specifically Android. In recent years the number of attacks has not only increased but each …
specifically Android. In recent years the number of attacks has not only increased but each …
Android malware detection based on multi-head squeeze-and-excitation residual network
H Zhu, W Gu, L Wang, Z Xu, VS Sheng - Expert Systems with Applications, 2023 - Elsevier
The popularity and flexibility of the Android platform makes it the primary target of malicious
attackers. The behaviors of malware, such as malicious charges and privacy theft, pose …
attackers. The behaviors of malware, such as malicious charges and privacy theft, pose …
An analytical review of the source code models for exploit analysis
Currently, enhancing the efficiency of vulnerability detection and assessment remains
relevant. We investigate a new approach for the detection of vulnerabilities that can be used …
relevant. We investigate a new approach for the detection of vulnerabilities that can be used …
HamDroid: permission-based harmful android anti-malware detection using neural networks
Android platforms are a popular target for attackers, while many users around the world are
victims of Android malwares threatening their private information. Numerous Android anti …
victims of Android malwares threatening their private information. Numerous Android anti …
Obfuscation detection in android applications using deep learning
Malware is often hidden in illegitimately cloned software. Android, with over two billions
active devices, is one of the most affected platforms because code cloning is quite simple …
active devices, is one of the most affected platforms because code cloning is quite simple …
DroidHook: a novel API-hook based Android malware dynamic analysis sandbox
Y Cui, Y Sun, Z Lin - Automated Software Engineering, 2023 - Springer
With the popularity of Android devices, mobile apps are prevalent in our daily life, making
them a target for attackers to steal private data and push advertisements. Dynamic analysis …
them a target for attackers to steal private data and push advertisements. Dynamic analysis …
Dynamic Security Analysis on Android: A Systematic Literature Review
Dynamic analysis is a technique that is used to fully understand the internals of a system at
runtime. On Android, dynamic security analysis involves real-time assessment and active …
runtime. On Android, dynamic security analysis involves real-time assessment and active …
[HTML][HTML] A survey and taxonomy of program analysis for IoT platforms
Heterogeneity in the Internet of Things (IoT) environment is a critical issue for supporting
security and privacy. IoT environment has become an open invitation to hackers to control …
security and privacy. IoT environment has become an open invitation to hackers to control …
CFSBFDroid: Android Malware Detection Using CFS+ Best First Search‐Based Feature Selection
With the fast development of smartphone technology and mobile applications, the mobile
phone has become the most powerful tool to access the Internet and get various services …
phone has become the most powerful tool to access the Internet and get various services …
MVDroid: an android malicious VPN detector using neural networks
Abstract The majority of Virtual Private Networks (VPNs) fail when it comes to protecting our
privacy. If we are using a VPN to protect our online privacy, many of the well-known VPNs …
privacy. If we are using a VPN to protect our online privacy, many of the well-known VPNs …