A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
N-opcode analysis for android malware classification and categorization
Malware detection is a growing problem particularly on the Android mobile platform due to
its increasing popularity and accessibility to numerous third party app markets. This has also …
its increasing popularity and accessibility to numerous third party app markets. This has also …
N-gram opcode analysis for android malware detection
Android malware has been on the rise in recent years due to the increasing popularity of
Android and the proliferation of third party application markets. Emerging Android malware …
Android and the proliferation of third party application markets. Emerging Android malware …
Hybrid-based analysis impact on ransomware detection for Android systems
R Almohaini, I Almomani, A AlKhayer - Applied Sciences, 2021 - mdpi.com
Android ransomware is one of the most threatening attacks that is increasing at an alarming
rate. Ransomware attacks usually target Android users by either locking their devices or …
rate. Ransomware attacks usually target Android users by either locking their devices or …
Cassandra: Towards a certifying app store for android
S Lortz, H Mantel, A Starostin, T Bähr… - Proceedings of the 4th …, 2014 - dl.acm.org
Modern mobile devices store and process an abundance of data. Although many users
consider some of this data as private, they do not yet obtain satisfactory support for …
consider some of this data as private, they do not yet obtain satisfactory support for …
Condroid: Targeted dynamic analysis of android applications
J Schütte, R Fedler, D Titze - 2015 IEEE 29th International …, 2015 - ieeexplore.ieee.org
Recent years have seen the development of a multitude of tools for the security analysis of
Android applications. A major deficit of current fully automated security analyses, however, is …
Android applications. A major deficit of current fully automated security analyses, however, is …
SAR image matching based on speeded up robust feature
R Liu, Y Wang - 2009 WRI Global Congress on Intelligent …, 2009 - ieeexplore.ieee.org
Speeded-Up Robust Features (SURF) is a novel scale-invariant and rotation-invariant
feature. It is perfect in its high computation speed and robustness. In this paper, we apply …
feature. It is perfect in its high computation speed and robustness. In this paper, we apply …
Cybersicherheit beyond 2020! Herausforderungen für die IT-Sicherheitsforschung
C Eckert - 50 Jahre Universitäts-Informatik in München, 2017 - Springer
Mit der Zusammenführung von physischen Systemen mit virtuellen Objekten zu Cyber‐
Physischen Systemen (CPS) schwinden die Grenzen zwischen digitaler und physikalischer …
Physischen Systemen (CPS) schwinden die Grenzen zwischen digitaler und physikalischer …
Towards Measuring Apps' Privacy-Friendliness
N Momen - 2018 - diva-portal.org
Today's phone could be described as a charismatic tool that has the ability to keep human
beings captivated for a considerable amount of their precious time. Users remain in the …
beings captivated for a considerable amount of their precious time. Users remain in the …
5G visions of user privacy
LT Sorensen, S Khajuria… - 2015 IEEE 81st vehicular …, 2015 - ieeexplore.ieee.org
Currently the discussions are going on the elements and definition of 5G networks. One of
the elements in this discussion is how to provide for user controlled privacy for securing …
the elements in this discussion is how to provide for user controlled privacy for securing …