[HTML][HTML] Machine learning for android malware detection: mission accomplished? a comprehensive review of open challenges and future perspectives

A Guerra-Manzanares - Computers & Security, 2024 - Elsevier
The extensive research in machine learning based Android malware detection showcases
high-performance metrics through a wide range of proposed solutions. Consequently, this …

Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses

Z Muhammad, Z Anwar, AR Javed, B Saleem, S Abbas… - Technologies, 2023 - mdpi.com
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …

Detection of evasive Android malware using EigenGCN

TS John, T Thomas, S Emmanuel - Journal of Information Security and …, 2024 - Elsevier
Recently there is an upsurge in Android malware that use obfuscation and repackaging
techniques for evasion. Malware may also combine both these techniques to create stealthy …

Leveraging the first line of defense: A study on the evolution and usage of android security permissions for enhanced android malware detection

A Guerra-Manzanares, H Bahsi, M Luckner - Journal of Computer Virology …, 2023 - Springer
Android security permissions are built-in security features that constrain what an app can do
and access on the system, that is, its privileges. Permissions have been widely used for …

On the relativity of time: Implications and challenges of data drift on long-term effective android malware detection

A Guerra-Manzanares, H Bahsi - Computers & Security, 2022 - Elsevier
The vast body of research in the Android malware detection domain has demonstrated that
machine learning can provide high performance for mobile malware detection. However, the …

Real-time system call-based ransomware detection

CJW Chew, V Kumar, P Patros, R Malik - International Journal of …, 2024 - Springer
Ransomware, particularly crypto ransomware, has emerged as the go-to malware for threat
actors aiming to compromise data on Android devices as well as in general. In this paper …

SoK: Visualization-based Malware Detection Techniques

M Brosolo, V Puthuvath, A Ka, R Rehiman… - Proceedings of the 19th …, 2024 - dl.acm.org
Cyber attackers leverage malware to infiltrate systems, steal sensitive data, and extort
victims, posing a significant cybersecurity threat. Security experts address this challenge by …

[HTML][HTML] M2FD: Mobile malware federated detection under concept drift

A Augello, A De Paola, GL Re - Computers & Security, 2025 - Elsevier
The ubiquitous diffusion of mobile devices requires the availability of effective malware
detection solutions to ensure user security and privacy. The dynamic nature of the mobile …

Process-aware security monitoring in industrial control systems: A systematic review and future directions

M ur Rehman, H Bahşi - International Journal of Critical Infrastructure …, 2024 - Elsevier
Due to the tight coupling between the cyber and physical components, control systems are
subjected to emerging cyberattacks. In addition to attacks based on networking and …