A survey of android application and malware hardening
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …
threat to individuals, societies and nations. Anti-malware companies are often the first and …
[HTML][HTML] A survey and evaluation of android-based malware evasion techniques and detection frameworks
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …
continuously evolve to identify novel malware and improve the timely and accurate detection …
Clinical computer security for victims of intimate partner violence
Digital insecurity in the face of targeted, persistent attacks increasingly leaves victims in
debilitating or even life-threatening situations. We propose an approach to helping victims …
debilitating or even life-threatening situations. We propose an approach to helping victims …
A root privilege management scheme with revocable authorization for Android devices
Y Tan, Y Xue, C Liang, J Zheng, Q Zhang… - Journal of Network and …, 2018 - Elsevier
As a critical part in mobile cloud computing, the vulnerability of Android devices can directly
affect the security of the mobile cloud. The unsecured Android can be potentially exploited …
affect the security of the mobile cloud. The unsecured Android can be potentially exploited …
Understanding the (in) security of cross-side face verification systems in mobile apps: a system perspective
Face Verification Systems (FVSes) are more and more deployed by real-world mobile
applications (apps) to verify a human's claimed identity. One popular type of FVSes is called …
applications (apps) to verify a human's claimed identity. One popular type of FVSes is called …
SafetyNOT: on the usage of the SafetyNet attestation API in Android
Many apps performing security-sensitive tasks (eg, online banking) attempt to verify the
integrity of the device they are running in and the integrity of their own code. To ease this …
integrity of the device they are running in and the integrity of their own code. To ease this …
[PDF][PDF] FedCRI: Federated Mobile Cyber-Risk Intelligence.
In the present era of ubiquitous digitization more and more services are becoming available
online which is amplified by the Corona pandemic. The fast-growing mobile service market …
online which is amplified by the Corona pandemic. The fast-growing mobile service market …
I always feel like somebody's sensing me! A framework to detect, identify, and localize clandestine wireless sensors
The increasing ubiquity of low-cost wireless sensors has enabled users to easily deploy
systems to remotely monitor and control their environments. However, this raises privacy …
systems to remotely monitor and control their environments. However, this raises privacy …
RootAgency: A digital signature-based root privilege management agency for cloud terminal devices
Y Xue, Y Tan, C Liang, Y Li, J Zheng, Q Zhang - Information Sciences, 2018 - Elsevier
Rooting an Android device can be a voluntary behavior from end users with various
motivations, such as removing OEM pre-installed apps. This leads to an increase in …
motivations, such as removing OEM pre-installed apps. This leads to an increase in …
A survey of Android exploits in the wild
The Android operating system has been dominating the mobile device market in recent
years. Although Android has actively strengthened its security mechanisms and fixed a great …
years. Although Android has actively strengthened its security mechanisms and fixed a great …