DyPolDroid: Protecting against permission-abuse attacks in android

CE Rubio-Medrano, PKD Soundrapandian… - Information Systems …, 2023 - Springer
Android applications are extremely popular, as they are widely used for banking, social
media, e-commerce, etc. Such applications typically leverage a series of Permissions, which …

Android security, pitfalls and lessons learned

S Liebergeld, M Lange - … Sciences and Systems 2013: Proceedings of the …, 2013 - Springer
Over the last two years Android became the most popular mobile operating system. But
Android is also targeted by an over-proportional share of malware. In this paper we …

{RGBDroid}: A Novel {Response-Based} Approach to Android Privilege Escalation Attacks

Y Park, CH Lee, C Lee, JH Lim, S Han, M Park… - 5th USENIX Workshop …, 2012 - usenix.org
Recent malware often collects sensitive information from third-party applications with an
illegally escalated privilege to the system level (the highest level) on the Android platform …

Toward engineering a secure android ecosystem: A survey of existing techniques

M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng… - ACM Computing …, 2016 - dl.acm.org
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …

Structural attack against graph based android malware detection

K Zhao, H Zhou, Y Zhu, X Zhan, K Zhou, J Li… - Proceedings of the …, 2021 - dl.acm.org
Malware detection techniques achieve great success with deeper insight into the semantics
of malware. Among existing detection techniques, function call graph (FCG) based methods …

Securing android: a survey, taxonomy, and challenges

Sufatrio, DJJ Tan, TW Chua, VLL Thing - ACM Computing Surveys …, 2015 - dl.acm.org
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …

[PDF][PDF] Xmandroid: A new android evolution to mitigate privilege escalation attacks

S Bugiel, L Davi, A Dmitrienko… - … Report TR-2011 …, 2011 - download.hrz.tu-darmstadt.de
Google Android has become a popular mobile operating system which is increasingly
deployed by mobile device manufactures for various platforms. Recent attacks show that …

DroidRay: a security evaluation system for customized android firmwares

M Zheng, M Sun, JCS Lui - Proceedings of the 9th ACM symposium on …, 2014 - dl.acm.org
Android mobile devices are enjoying a lion's market share in smartphones and mobile
devices. This also attracts malware writers to target the Android platform. Recently, we have …

Hey google, what exactly do your security patches tell us? a large-scale empirical study on android patched vulnerabilities

S Farhang, MB Kirdan, A Laszka… - arXiv preprint arXiv …, 2019 - arxiv.org
In this paper, we perform a comprehensive study of 2,470 patched Android vulnerabilities
that we collect from different data sources such as Android security bulletins, CVEDetails …

A survey of malware detection in Android apps: Recommendations and perspectives for future research

A Razgallah, R Khoury, S Hallé… - Computer Science …, 2021 - Elsevier
Android has dominated the smartphone market and has become the most popular operating
system for mobile devices. However, security threats in Android applications have also …