The evolution of android malware and android analysis techniques
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
A survey of app store analysis for software engineering
App Store Analysis studies information about applications obtained from app stores. App
stores provide a wealth of information derived from users that would not exist had the …
stores provide a wealth of information derived from users that would not exist had the …
Consortium blockchain-based malware detection in mobile devices
To address the problem of detecting malicious codes in malware and extracting the
corresponding evidences in mobile devices, we construct a consortium blockchain …
corresponding evidences in mobile devices, we construct a consortium blockchain …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
[PDF][PDF] Going native: Using a large-scale analysis of android apps to create a practical native-code sandboxing policy
Current static analysis techniques for Android applications operate at the Java level—that is,
they analyze either the Java source code or the Dalvik bytecode. However, Android allows …
they analyze either the Java source code or the Dalvik bytecode. However, Android allows …
* droid: Assessment and evaluation of android application analysis tools
The security research community has invested significant effort in improving the security of
Android applications over the past half decade. This effort has addressed a wide range of …
Android applications over the past half decade. This effort has addressed a wide range of …
SafetyNOT: on the usage of the SafetyNet attestation API in Android
Many apps performing security-sensitive tasks (eg, online banking) attempt to verify the
integrity of the device they are running in and the integrity of their own code. To ease this …
integrity of the device they are running in and the integrity of their own code. To ease this …
Discovering flaws in {Security-Focused} static analysis tools for android using systematic mutation
Mobile application security has been one of the major areas of security research in the last
decade. Numerous application analysis tools have been proposed in response to malicious …
decade. Numerous application analysis tools have been proposed in response to malicious …
A study of security isolation techniques
Security isolation is a foundation of computing systems that enables resilience to different
forms of attacks. This article seeks to understand existing security isolation techniques by …
forms of attacks. This article seeks to understand existing security isolation techniques by …
Rootector: robust android rooting detection framework using machine learning algorithms
Recently, the newly launched Google protect service alerts Android users from installing
rooting tools. However, Android users lean toward rooting their Android devices to gain …
rooting tools. However, Android users lean toward rooting their Android devices to gain …