The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

A survey of app store analysis for software engineering

W Martin, F Sarro, Y Jia, Y Zhang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
App Store Analysis studies information about applications obtained from app stores. App
stores provide a wealth of information derived from users that would not exist had the …

Consortium blockchain-based malware detection in mobile devices

J Gu, B Sun, X Du, J Wang, Y Zhuang, Z Wang - IEEE Access, 2018 - ieeexplore.ieee.org
To address the problem of detecting malicious codes in malware and extracting the
corresponding evidences in mobile devices, we construct a consortium blockchain …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

[PDF][PDF] Going native: Using a large-scale analysis of android apps to create a practical native-code sandboxing policy

V Afonso, A Bianchi, Y Fratantonio… - The Network and …, 2016 - re.public.polimi.it
Current static analysis techniques for Android applications operate at the Java level—that is,
they analyze either the Java source code or the Dalvik bytecode. However, Android allows …

* droid: Assessment and evaluation of android application analysis tools

B Reaves, J Bowers, SA Gorski III, O Anise… - ACM Computing …, 2016 - dl.acm.org
The security research community has invested significant effort in improving the security of
Android applications over the past half decade. This effort has addressed a wide range of …

SafetyNOT: on the usage of the SafetyNet attestation API in Android

M Ibrahim, A Imran, A Bianchi - Proceedings of the 19th Annual …, 2021 - dl.acm.org
Many apps performing security-sensitive tasks (eg, online banking) attempt to verify the
integrity of the device they are running in and the integrity of their own code. To ease this …

Discovering flaws in {Security-Focused} static analysis tools for android using systematic mutation

R Bonett, K Kafle, K Moran, A Nadkarni… - 27th USENIX Security …, 2018 - usenix.org
Mobile application security has been one of the major areas of security research in the last
decade. Numerous application analysis tools have been proposed in response to malicious …

A study of security isolation techniques

R Shu, P Wang, SA Gorski III, B Andow… - ACM Computing …, 2016 - dl.acm.org
Security isolation is a foundation of computing systems that enables resilience to different
forms of attacks. This article seeks to understand existing security isolation techniques by …

Rootector: robust android rooting detection framework using machine learning algorithms

WF Elsersy, NB Anuar, MFA Razak - Arabian Journal for Science and …, 2023 - Springer
Recently, the newly launched Google protect service alerts Android users from installing
rooting tools. However, Android users lean toward rooting their Android devices to gain …