Malicious application detection in android—a systematic literature review
Context: In last decade, due to tremendous usage of smart phones it seems that these
gadgets became an essential necessity of day-to-day life. People are using new …
gadgets became an essential necessity of day-to-day life. People are using new …
Comprehensive review and analysis of anti-malware apps for smartphones
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …
largely scattered. The available options and gaps in this research area must be analysed to …
Rebooting research on detecting repackaged android apps: Literature review and benchmark
Repackaging is a serious threat to the Android ecosystem as it deprives app developers of
their benefits, contributes to spreading malware on users' devices, and increases the …
their benefits, contributes to spreading malware on users' devices, and increases the …
A survey and evaluation of android-based malware evasion techniques and detection frameworks
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …
continuously evolve to identify novel malware and improve the timely and accurate detection …
Detecting third-party libraries in android applications with high precision and recall
Third-party libraries are widely used in Android applications to ease development and
enhance functionalities. However, the incorporated libraries also bring new security & …
enhance functionalities. However, the incorporated libraries also bring new security & …
The rise of obfuscated Android malware and impacts on detection methods
The various application markets are facing an exponential growth of Android malware. Every
day, thousands of new Android malware applications emerge. Android malware hackers …
day, thousands of new Android malware applications emerge. Android malware hackers …
Probabilistic data structures for big data analytics: A comprehensive review
An exponential increase in the data generation resources is widely observed in last decade,
because of evolution in technologies such as-cloud computing, IoT, social networking, etc …
because of evolution in technologies such as-cloud computing, IoT, social networking, etc …
IoT-based green city architecture using secured and sustainable android services
Green and smart cities deliver services to their residents using mobile applications that
make daily life more convenient. The privacy and security of these applications are …
make daily life more convenient. The privacy and security of these applications are …
Mobile app squatting
Domain squatting, the adversarial tactic where attackers register domain names that mimic
popular ones, has been observed for decades. However, there has been growing anecdotal …
popular ones, has been observed for decades. However, there has been growing anecdotal …
Who changed you? Obfuscator identification for Android
Android developers commonly use app obfuscation to secure their apps and intellectual
property. Although obfuscation provides protection, it presents an obstacle for a number of …
property. Although obfuscation provides protection, it presents an obstacle for a number of …