Toward engineering a secure android ecosystem: A survey of existing techniques
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …
The rise of obfuscated Android malware and impacts on detection methods
The various application markets are facing an exponential growth of Android malware. Every
day, thousands of new Android malware applications emerge. Android malware hackers …
day, thousands of new Android malware applications emerge. Android malware hackers …
Charm: Facilitating dynamic analysis of device drivers of mobile systems
Mobile systems, such as smartphones and tablets, incorporate a diverse set of I/O devices,
such as camera, audio devices, GPU, and sensors. This in turn results in a large number of …
such as camera, audio devices, GPU, and sensors. This in turn results in a large number of …
{KOOBE}: Towards facilitating exploit generation of kernel {Out-Of-Bounds} write vulnerabilities
The monolithic nature of modern OS kernels leads to a constant stream of bugs being
discovered. It is often unclear which of these bugs are worth fixing, as only a subset of them …
discovered. It is often unclear which of these bugs are worth fixing, as only a subset of them …
{PARTEMU}: Enabling Dynamic Analysis of {Real-World}{TrustZone} Software Using Emulation
ARM's TrustZone technology is the basis for security of billions of devices worldwide,
including Android smartphones and IoT devices. Because TrustZone has access to sensitive …
including Android smartphones and IoT devices. Because TrustZone has access to sensitive …
An empirical assessment of global COVID-19 contact tracing applications
The rapid spread of COVID-19 has made manual contact tracing difficult. Thus, various
public health authorities have experimented with automatic contact tracing using mobile …
public health authorities have experimented with automatic contact tracing using mobile …
Hardware-based malware detection using low-level architectural features
Security exploits and ensuant malware pose an increasing challenge to computing systems
as the variety and complexity of attacks continue to increase. In response, software-based …
as the variety and complexity of attacks continue to increase. In response, software-based …
Challenges and pitfalls in malware research
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …
research questions arose, such as how to make malware research reproducible, how to …
Adaptive android kernel live patching
Android kernel vulnerabilities pose a serious threat to user security and privacy. They allow
attackers to take full control over victim devices, install malicious and unwanted apps, and …
attackers to take full control over victim devices, install malicious and unwanted apps, and …
Android malware detection via (somewhat) robust irreversible feature transformations
Q Han, VS Subrahmanian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
As the most widely used OS on earth, Android is heavily targeted by malicious hackers.
Though much work has been done on detecting Android malware, hackers are becoming …
Though much work has been done on detecting Android malware, hackers are becoming …