A survey of android application and malware hardening

V Sihag, M Vardhan, P Singh - Computer Science Review, 2021 - Elsevier
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …

[HTML][HTML] A survey and evaluation of android-based malware evasion techniques and detection frameworks

P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun… - Information, 2023 - mdpi.com
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …

Clinical computer security for victims of intimate partner violence

S Havron, D Freed, R Chatterjee, D McCoy… - 28th USENIX Security …, 2019 - usenix.org
Digital insecurity in the face of targeted, persistent attacks increasingly leaves victims in
debilitating or even life-threatening situations. We propose an approach to helping victims …

A root privilege management scheme with revocable authorization for Android devices

Y Tan, Y Xue, C Liang, J Zheng, Q Zhang… - Journal of Network and …, 2018 - Elsevier
As a critical part in mobile cloud computing, the vulnerability of Android devices can directly
affect the security of the mobile cloud. The unsecured Android can be potentially exploited …

Understanding the (in) security of cross-side face verification systems in mobile apps: a system perspective

X Zhang, H Ye, Z Huang, X Ye, Y Cao… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Face Verification Systems (FVSes) are more and more deployed by real-world mobile
applications (apps) to verify a human's claimed identity. One popular type of FVSes is called …

SafetyNOT: on the usage of the SafetyNet attestation API in Android

M Ibrahim, A Imran, A Bianchi - Proceedings of the 19th Annual …, 2021 - dl.acm.org
Many apps performing security-sensitive tasks (eg, online banking) attempt to verify the
integrity of the device they are running in and the integrity of their own code. To ease this …

[PDF][PDF] FedCRI: Federated Mobile Cyber-Risk Intelligence.

H Fereidooni, A Dmitrienko, P Rieger, M Miettinen… - NDSS, 2022 - ndss-symposium.org
In the present era of ubiquitous digitization more and more services are becoming available
online which is amplified by the Corona pandemic. The fast-growing mobile service market …

I always feel like somebody's sensing me! A framework to detect, identify, and localize clandestine wireless sensors

AD Singh, L Garcia, J Noor, M Srivastava - 30th USENIX Security …, 2021 - usenix.org
The increasing ubiquity of low-cost wireless sensors has enabled users to easily deploy
systems to remotely monitor and control their environments. However, this raises privacy …

RootAgency: A digital signature-based root privilege management agency for cloud terminal devices

Y Xue, Y Tan, C Liang, Y Li, J Zheng, Q Zhang - Information Sciences, 2018 - Elsevier
Rooting an Android device can be a voluntary behavior from end users with various
motivations, such as removing OEM pre-installed apps. This leads to an increase in …

A survey of Android exploits in the wild

H Meng, VLL Thing, Y Cheng, Z Dai, L Zhang - Computers & Security, 2018 - Elsevier
The Android operating system has been dominating the mobile device market in recent
years. Although Android has actively strengthened its security mechanisms and fixed a great …