[HTML][HTML] Machine learning for android malware detection: mission accomplished? a comprehensive review of open challenges and future perspectives
A Guerra-Manzanares - Computers & Security, 2024 - Elsevier
The extensive research in machine learning based Android malware detection showcases
high-performance metrics through a wide range of proposed solutions. Consequently, this …
high-performance metrics through a wide range of proposed solutions. Consequently, this …
Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …
due to business dependencies such as communication, virtual meetings, and access to …
Detection of evasive Android malware using EigenGCN
Recently there is an upsurge in Android malware that use obfuscation and repackaging
techniques for evasion. Malware may also combine both these techniques to create stealthy …
techniques for evasion. Malware may also combine both these techniques to create stealthy …
Leveraging the first line of defense: A study on the evolution and usage of android security permissions for enhanced android malware detection
Android security permissions are built-in security features that constrain what an app can do
and access on the system, that is, its privileges. Permissions have been widely used for …
and access on the system, that is, its privileges. Permissions have been widely used for …
On the relativity of time: Implications and challenges of data drift on long-term effective android malware detection
The vast body of research in the Android malware detection domain has demonstrated that
machine learning can provide high performance for mobile malware detection. However, the …
machine learning can provide high performance for mobile malware detection. However, the …
Real-time system call-based ransomware detection
Ransomware, particularly crypto ransomware, has emerged as the go-to malware for threat
actors aiming to compromise data on Android devices as well as in general. In this paper …
actors aiming to compromise data on Android devices as well as in general. In this paper …
SoK: Visualization-based Malware Detection Techniques
Cyber attackers leverage malware to infiltrate systems, steal sensitive data, and extort
victims, posing a significant cybersecurity threat. Security experts address this challenge by …
victims, posing a significant cybersecurity threat. Security experts address this challenge by …
[HTML][HTML] M2FD: Mobile malware federated detection under concept drift
The ubiquitous diffusion of mobile devices requires the availability of effective malware
detection solutions to ensure user security and privacy. The dynamic nature of the mobile …
detection solutions to ensure user security and privacy. The dynamic nature of the mobile …
Process-aware security monitoring in industrial control systems: A systematic review and future directions
Due to the tight coupling between the cyber and physical components, control systems are
subjected to emerging cyberattacks. In addition to attacks based on networking and …
subjected to emerging cyberattacks. In addition to attacks based on networking and …