[HTML][HTML] A survey on large language model (llm) security and privacy: The good, the bad, and the ugly

Y Yao, J Duan, K Xu, Y Cai, Z Sun, Y Zhang - High-Confidence Computing, 2024 - Elsevier
Abstract Large Language Models (LLMs), such as ChatGPT and Bard, have revolutionized
natural language understanding and generation. They possess deep language …

The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

A survey of mobile malware in the wild

AP Felt, M Finifter, E Chin, S Hanna… - Proceedings of the 1st …, 2011 - dl.acm.org
Mobile malware is rapidly becoming a serious threat. In this paper, we survey the current
state of mobile malware in the wild. We analyze the incentives behind 46 pieces of iOS …

Droiddetector: android malware characterization and detection using deep learning

Z Yuan, Y Lu, Y Xue - Tsinghua Science and Technology, 2016 - ieeexplore.ieee.org
Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android
has been the most popular mobile operating system since 2012. However, owing to the …

Why Eve and Mallory love Android: An analysis of Android SSL (in) security

S Fahl, M Harbach, T Muders, L Baumgärtner… - Proceedings of the …, 2012 - dl.acm.org
Many Android apps have a legitimate need to communicate over the Internet and are then
responsible for protecting potentially sensitive data during transit. This paper seeks to better …

An empirical study of cryptographic misuse in android applications

M Egele, D Brumley, Y Fratantonio… - Proceedings of the 2013 …, 2013 - dl.acm.org
Developers use cryptographic APIs in Android with the intent of securing data such as
passwords and personal information on mobile devices. In this paper, we ask whether …

Aurasium: Practical policy enforcement for android applications

R Xu, H Saïdi, R Anderson - 21st USENIX Security Symposium (USENIX …, 2012 - usenix.org
The increasing popularity of Google's mobile platform Android makes it the prime target of
the latest surge in mobile malware. Most research on enhancing the platform's security and …

[PDF][PDF] Execute this! analyzing unsafe and malicious dynamic code loading in android applications.

S Poeplau, Y Fratantonio, A Bianchi, C Kruegel… - NDSS, 2014 - lilicoding.github.io
The design of the Android system allows applications to load additional code from external
sources at runtime. On the one hand, malware can use this capability to add malicious …

APK Auditor: Permission-based Android malware detection system

KA Talha, DI Alper, C Aydin - Digital Investigation, 2015 - Elsevier
Android operating system has the highest market share in 2014; making it the most widely
used mobile operating system in the world. This fact makes Android users the biggest target …

Evading android runtime analysis via sandbox detection

T Vidas, N Christin - Proceedings of the 9th ACM symposium on …, 2014 - dl.acm.org
The large amounts of malware, and its diversity, have made it necessary for the security
community to use automated dynamic analysis systems. These systems often rely on …