Android rooting: An arms race between evasion and detection

L Nguyen-Vu, NT Chau, S Kang… - Security and …, 2017 - Wiley Online Library
We present an arms race between rooting detection and rooting evasion. We investigate
different methods to detect rooted device at both Java and native level and evaluate the …

Rootector: robust android rooting detection framework using machine learning algorithms

WF Elsersy, NB Anuar, MFA Razak - Arabian Journal for Science and …, 2023 - Springer
Recently, the newly launched Google protect service alerts Android users from installing
rooting tools. However, Android users lean toward rooting their Android devices to gain …

False sense of security: A study on the effectivity of jailbreak detection in banking apps

A Kellner, M Horlboge, K Rieck… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
People increasingly rely on mobile devices for banking transactions or two-factor
authentication (2FA) and thus trust in the security provided by the underlying operating …

" Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps

L Shi, J Fu, Z Guo, J Ming - Proceedings of the 17th Annual International …, 2019 - dl.acm.org
Recent developed application-level virtualization brings a groundbreaking innovation to
Android ecosystem: a host app is able to load and launch arbitrary guest APK files without …

Gig Work at What Cost? Exploring Privacy Risks of Gig Work Platform Participation in the US

A Pradeep, J Gunawan, Á Feal… - Proceedings on …, 2025 - petsymposium.org
In recent years," gig work" platforms have gained popularity as a way for individuals to earn
money; as of 2021, 16% of Americans have at some point earned money from such …

ARAP: Demystifying Anti Runtime Analysis Code in Android Apps

D Suo, L Xue, R Tan, W Huang, G Sun - arXiv preprint arXiv:2408.11080, 2024 - arxiv.org
With the continuous growth in the usage of Android apps, ensuring their security has
become critically important. An increasing number of malicious apps adopt anti-analysis …

Enhancing Password Manager Application Security By Root Detection with Usability and Security Evaluation

GWW Mukti, R Roestam - 2023 Eighth International Conference …, 2023 - ieeexplore.ieee.org
Passwords are commonly used authentication method for many digital applications. The
maximum number of passwords that an adult can deal with is four to five passwords. In this …

Haly: Automated evaluation of hardening techniques in Android and iOS apps

ACW Beijnum - 2023 - essay.utwente.nl
Although mobile operating systems employ a variety of features to sandbox and isolate
apps, these are not always sufficient. Because of this, app developers are recommended to …

Super Root: A New Stealthy Rooting Technique on ARM Devices

Z Zhang, Y Cheng, Z Li - Applied Cryptography and Network Security: 18th …, 2020 - Springer
Root attack is an unauthorized process of gaining the highest privilege by exploiting the
vulnerabilities of a system. After that, attackers can fully control the system, arbitrarily access …

On Root Detection Strategies for Android Devices

R Bialon - arXiv preprint arXiv:2012.01812, 2020 - arxiv.org
The Android operating system runs on the majority of smartphones nowadays. Its success is
driven by its availability to a variety of smartphone hardware vendors on the one hand, and …