The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

A survey of app store analysis for software engineering

W Martin, F Sarro, Y Jia, Y Zhang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
App Store Analysis studies information about applications obtained from app stores. App
stores provide a wealth of information derived from users that would not exist had the …

A blockchain-empowered access control framework for smart devices in green internet of things

L Tan, N Shi, K Yu, M Aloqaily, Y Jararweh - ACM Transactions on …, 2021 - dl.acm.org
Green Internet of things (GIoT) generally refers to a new generation of Internet of things
design concept. It can save energy and reduce emissions, reduce environmental pollution …

MAPAS: a practical deep learning-based android malware detection system

J Kim, Y Ban, E Ko, H Cho, JH Yi - International Journal of Information …, 2022 - Springer
A lot of malicious applications appears every day, threatening numerous users. Therefore, a
surge of studies have been conducted to protect users from newly emerging malware by …

Droiddetector: android malware characterization and detection using deep learning

Z Yuan, Y Lu, Y Xue - Tsinghua Science and Technology, 2016 - ieeexplore.ieee.org
Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android
has been the most popular mobile operating system since 2012. However, owing to the …

Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network

W Wang, M Zhao, J Wang - Journal of Ambient Intelligence and …, 2019 - Springer
Android security incidents occurred frequently in recent years. To improve the accuracy and
efficiency of large-scale Android malware detection, in this work, we propose a hybrid model …

{SmartAuth}:{User-Centered} authorization for the internet of things

Y Tian, N Zhang, YH Lin, XF Wang, B Ur… - 26th USENIX Security …, 2017 - usenix.org
Internet of Things (IoT) platforms often require users to grant permissions to third-party apps,
such as the ability to control a lock. Unfortunately, because few users act based upon, or …

Androdialysis: Analysis of android intent effectiveness in malware detection

A Feizollah, NB Anuar, R Salleh, G Suarez-Tangil… - computers & …, 2017 - Elsevier
The wide popularity of Android systems has been accompanied by increase in the number
of malware targeting these systems. This is largely due to the open nature of the Android …