Malicious application detection in android—a systematic literature review

T Sharma, D Rattan - Computer Science Review, 2021 - Elsevier
Context: In last decade, due to tremendous usage of smart phones it seems that these
gadgets became an essential necessity of day-to-day life. People are using new …

Comprehensive review and analysis of anti-malware apps for smartphones

M Talal, AA Zaidan, BB Zaidan, OS Albahri… - Telecommunication …, 2019 - Springer
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …

Rebooting research on detecting repackaged android apps: Literature review and benchmark

L Li, TF Bissyandé, J Klein - IEEE Transactions on Software …, 2019 - ieeexplore.ieee.org
Repackaging is a serious threat to the Android ecosystem as it deprives app developers of
their benefits, contributes to spreading malware on users' devices, and increases the …

A survey and evaluation of android-based malware evasion techniques and detection frameworks

P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun… - Information, 2023 - mdpi.com
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …

Detecting third-party libraries in android applications with high precision and recall

Y Zhang, J Dai, X Zhang, S Huang… - 2018 IEEE 25th …, 2018 - ieeexplore.ieee.org
Third-party libraries are widely used in Android applications to ease development and
enhance functionalities. However, the incorporated libraries also bring new security & …

The rise of obfuscated Android malware and impacts on detection methods

WF Elsersy, A Feizollah, NB Anuar - PeerJ Computer Science, 2022 - peerj.com
The various application markets are facing an exponential growth of Android malware. Every
day, thousands of new Android malware applications emerge. Android malware hackers …

Probabilistic data structures for big data analytics: A comprehensive review

A Singh, S Garg, R Kaur, S Batra, N Kumar… - Knowledge-Based …, 2020 - Elsevier
An exponential increase in the data generation resources is widely observed in last decade,
because of evolution in technologies such as-cloud computing, IoT, social networking, etc …

IoT-based green city architecture using secured and sustainable android services

F Ullah, F Al-Turjman, A Nayyar - Environmental Technology & Innovation, 2020 - Elsevier
Green and smart cities deliver services to their residents using mobile applications that
make daily life more convenient. The privacy and security of these applications are …

Mobile app squatting

Y Hu, H Wang, R He, L Li, G Tyson, I Castro… - Proceedings of The …, 2020 - dl.acm.org
Domain squatting, the adversarial tactic where attackers register domain names that mimic
popular ones, has been observed for decades. However, there has been growing anecdotal …

Who changed you? Obfuscator identification for Android

Y Wang, A Rountev - 2017 IEEE/ACM 4th International …, 2017 - ieeexplore.ieee.org
Android developers commonly use app obfuscation to secure their apps and intellectual
property. Although obfuscation provides protection, it presents an obstacle for a number of …