Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …
due to business dependencies such as communication, virtual meetings, and access to …
Android's Cat-and-Mouse Game: Understanding Evasion Techniques against Dynamic Analysis
The Android OS, known for its openness and flexibility, dominates the global smartphone
market, enabling the creation and distribution of a vast array of apps. However, this …
market, enabling the creation and distribution of a vast array of apps. However, this …
An Anti-Fuzzing Approach for Android Apps
Extracting evidence pertaining to mobile apps is a key task in mobile device forensics. Since
mobile apps can generate more than 19,000 files on a single device, it is time consuming …
mobile apps can generate more than 19,000 files on a single device, it is time consuming …
A detector for Android repackaged applications with layout-fingerprint
Some existing methods for detecting repackaged apps use layout files to generate a global
layout tree, but this can result in node positions affecting feature accuracy and repeated …
layout tree, but this can result in node positions affecting feature accuracy and repeated …
Stdneut: Neutralizing sensor, telephony system and device state information on emulated android environments
Sophisticated malware employs various emulation-detection techniques to bypass the
dynamic analysis systems that are running on top of virtualized environments. Hence, a …
dynamic analysis systems that are running on top of virtualized environments. Hence, a …
Leveraging Side-Channels to Fingerprint Software Systems
B Kondracki - 2023 - search.proquest.com
Attackers and defenders are engaged in an information arms race, where gaining a
momentary upper-hand can mean the difference between a successful or thwarted attack …
momentary upper-hand can mean the difference between a successful or thwarted attack …
Studying the effectiveness of dynamic analysis for fingerprinting Android malware behavior
V Regard - 2019 - diva-portal.org
Android is the second most targeted operating system for malware authors and to counter
the development of Android malware, more knowledge about their behavior is needed …
the development of Android malware, more knowledge about their behavior is needed …