DroidMalwareDetector: A novel Android malware detection framework based on convolutional neural network

AT Kabakus - Expert Systems with Applications, 2022 - Elsevier
Smartphones have become an integral part of our daily lives thanks to numerous reasons.
While benefitting from what they offer, it is critical to be aware of the existence of malware in …

Jn-saf: Precise and efficient ndk/jni-aware inter-language static analysis framework for security vetting of android applications with native code

F Wei, X Lin, X Ou, T Chen, X Zhang - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Android allows application developers to use native language (C/C++) to implement a part
or the complete program. Recent research and our own statistics show that native payloads …

Analyses for specific defects in android applications: a survey

T Wu, X Deng, J Yan, J Zhang - Frontiers of Computer Science, 2019 - Springer
Android applications (APPS) are in widespread use and have enriched our life. To ensure
the quality and security of the apps, many approaches have been proposed in recent years …

Security smells in android

M Ghafari, P Gadient… - 2017 IEEE 17th …, 2017 - ieeexplore.ieee.org
The ubiquity of smartphones, and their very broad capabilities and usage, make the security
of these devices tremendously important. Unfortunately, despite all progress in security and …

{ATtention} spanned: Comprehensive vulnerability analysis of {AT} commands within the android ecosystem

DJ Tian, G Hernandez, JI Choi, V Frost… - 27th USENIX security …, 2018 - usenix.org
AT commands, originally designed in the early 80s for controlling modems, are still in use in
most modern smartphones to support telephony functions. The role of AT commands in …

Droidvecdeep: Android malware detection based on word2vec and deep belief network

T Chen, Q Mao, M Lv, H Cheng, Y Li - KSII Transactions on Internet …, 2019 - koreascience.kr
With the proliferation of the Android malicious applications, malware becomes more capable
of hiding or confusing its malicious intent through the use of code obfuscation, which has …

{BigMAC}:{Fine-Grained} policy analysis of android firmware

G Hernandez, DJ Tian, AS Yadav, BJ Williams… - 29th USENIX Security …, 2020 - usenix.org
The Android operating system is the world's dominant mobile computing platform. To defend
against malicious applications and external attack, Android relies upon a complex …

NatiSand: Native code sandboxing for JavaScript runtimes

M Abbadini, D Facchinetti, G Oldani, M Rossi… - Proceedings of the 26th …, 2023 - dl.acm.org
Modern runtimes render JavaScript code in a secure and isolated environment, but when
they execute binary programs and shared libraries, no isolation guarantees are provided …

{Man-in-the-Machine}: Exploiting {Ill-Secured} Communication Inside the Computer

T Bui, SP Rao, M Antikainen, VM Bojan… - 27th USENIX security …, 2018 - usenix.org
Operating systems provide various inter-process communication (IPC) mechanisms.
Software applications typically use IPC for communication between front-end and back-end …

Invetter: Locating insecure input validations in android services

L Zhang, Z Yang, Y He, Z Zhang, Z Qian… - Proceedings of the …, 2018 - dl.acm.org
Android integrates an increasing number of features into system services to manage
sensitive resources, such as location, medical and social network information. To prevent …