Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
DroidMalwareDetector: A novel Android malware detection framework based on convolutional neural network
AT Kabakus - Expert Systems with Applications, 2022 - Elsevier
Smartphones have become an integral part of our daily lives thanks to numerous reasons.
While benefitting from what they offer, it is critical to be aware of the existence of malware in …
While benefitting from what they offer, it is critical to be aware of the existence of malware in …
Jn-saf: Precise and efficient ndk/jni-aware inter-language static analysis framework for security vetting of android applications with native code
Android allows application developers to use native language (C/C++) to implement a part
or the complete program. Recent research and our own statistics show that native payloads …
or the complete program. Recent research and our own statistics show that native payloads …
Analyses for specific defects in android applications: a survey
T Wu, X Deng, J Yan, J Zhang - Frontiers of Computer Science, 2019 - Springer
Android applications (APPS) are in widespread use and have enriched our life. To ensure
the quality and security of the apps, many approaches have been proposed in recent years …
the quality and security of the apps, many approaches have been proposed in recent years …
Security smells in android
The ubiquity of smartphones, and their very broad capabilities and usage, make the security
of these devices tremendously important. Unfortunately, despite all progress in security and …
of these devices tremendously important. Unfortunately, despite all progress in security and …
{ATtention} spanned: Comprehensive vulnerability analysis of {AT} commands within the android ecosystem
AT commands, originally designed in the early 80s for controlling modems, are still in use in
most modern smartphones to support telephony functions. The role of AT commands in …
most modern smartphones to support telephony functions. The role of AT commands in …
Droidvecdeep: Android malware detection based on word2vec and deep belief network
T Chen, Q Mao, M Lv, H Cheng, Y Li - KSII Transactions on Internet …, 2019 - koreascience.kr
With the proliferation of the Android malicious applications, malware becomes more capable
of hiding or confusing its malicious intent through the use of code obfuscation, which has …
of hiding or confusing its malicious intent through the use of code obfuscation, which has …
{BigMAC}:{Fine-Grained} policy analysis of android firmware
The Android operating system is the world's dominant mobile computing platform. To defend
against malicious applications and external attack, Android relies upon a complex …
against malicious applications and external attack, Android relies upon a complex …
NatiSand: Native code sandboxing for JavaScript runtimes
Modern runtimes render JavaScript code in a secure and isolated environment, but when
they execute binary programs and shared libraries, no isolation guarantees are provided …
they execute binary programs and shared libraries, no isolation guarantees are provided …
{Man-in-the-Machine}: Exploiting {Ill-Secured} Communication Inside the Computer
Operating systems provide various inter-process communication (IPC) mechanisms.
Software applications typically use IPC for communication between front-end and back-end …
Software applications typically use IPC for communication between front-end and back-end …
Invetter: Locating insecure input validations in android services
Android integrates an increasing number of features into system services to manage
sensitive resources, such as location, medical and social network information. To prevent …
sensitive resources, such as location, medical and social network information. To prevent …