Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses

Z Muhammad, Z Anwar, AR Javed, B Saleem, S Abbas… - Technologies, 2023 - mdpi.com
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …

Android's Cat-and-Mouse Game: Understanding Evasion Techniques against Dynamic Analysis

S Li, R Li, S Yang, W Diao - 2024 IEEE 35th International …, 2024 - ieeexplore.ieee.org
The Android OS, known for its openness and flexibility, dominates the global smartphone
market, enabling the creation and distribution of a vast array of apps. However, this …

An Anti-Fuzzing Approach for Android Apps

CCC Cheng, L Lin, C Shi, Y Guan - IFIP International Conference on …, 2023 - Springer
Extracting evidence pertaining to mobile apps is a key task in mobile device forensics. Since
mobile apps can generate more than 19,000 files on a single device, it is time consuming …

A detector for Android repackaged applications with layout-fingerprint

T Tu, H Zhang, Y Hu, D Cui, X Zhai - Journal of Information Security and …, 2023 - Elsevier
Some existing methods for detecting repackaged apps use layout files to generate a global
layout tree, but this can result in node positions affecting feature accuracy and repeated …

Stdneut: Neutralizing sensor, telephony system and device state information on emulated android environments

S Kumar, D Mishra, B Panda, SK Shukla - Cryptology and Network …, 2020 - Springer
Sophisticated malware employs various emulation-detection techniques to bypass the
dynamic analysis systems that are running on top of virtualized environments. Hence, a …

Leveraging Side-Channels to Fingerprint Software Systems

B Kondracki - 2023 - search.proquest.com
Attackers and defenders are engaged in an information arms race, where gaining a
momentary upper-hand can mean the difference between a successful or thwarted attack …

Studying the effectiveness of dynamic analysis for fingerprinting Android malware behavior

V Regard - 2019 - diva-portal.org
Android is the second most targeted operating system for malware authors and to counter
the development of Android malware, more knowledge about their behavior is needed …