Android rooting: An arms race between evasion and detection
L Nguyen-Vu, NT Chau, S Kang… - Security and …, 2017 - Wiley Online Library
We present an arms race between rooting detection and rooting evasion. We investigate
different methods to detect rooted device at both Java and native level and evaluate the …
different methods to detect rooted device at both Java and native level and evaluate the …
Rootector: robust android rooting detection framework using machine learning algorithms
Recently, the newly launched Google protect service alerts Android users from installing
rooting tools. However, Android users lean toward rooting their Android devices to gain …
rooting tools. However, Android users lean toward rooting their Android devices to gain …
False sense of security: A study on the effectivity of jailbreak detection in banking apps
A Kellner, M Horlboge, K Rieck… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
People increasingly rely on mobile devices for banking transactions or two-factor
authentication (2FA) and thus trust in the security provided by the underlying operating …
authentication (2FA) and thus trust in the security provided by the underlying operating …
" Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps
L Shi, J Fu, Z Guo, J Ming - Proceedings of the 17th Annual International …, 2019 - dl.acm.org
Recent developed application-level virtualization brings a groundbreaking innovation to
Android ecosystem: a host app is able to load and launch arbitrary guest APK files without …
Android ecosystem: a host app is able to load and launch arbitrary guest APK files without …
Gig Work at What Cost? Exploring Privacy Risks of Gig Work Platform Participation in the US
In recent years," gig work" platforms have gained popularity as a way for individuals to earn
money; as of 2021, 16% of Americans have at some point earned money from such …
money; as of 2021, 16% of Americans have at some point earned money from such …
ARAP: Demystifying Anti Runtime Analysis Code in Android Apps
With the continuous growth in the usage of Android apps, ensuring their security has
become critically important. An increasing number of malicious apps adopt anti-analysis …
become critically important. An increasing number of malicious apps adopt anti-analysis …
Enhancing Password Manager Application Security By Root Detection with Usability and Security Evaluation
Passwords are commonly used authentication method for many digital applications. The
maximum number of passwords that an adult can deal with is four to five passwords. In this …
maximum number of passwords that an adult can deal with is four to five passwords. In this …
Haly: Automated evaluation of hardening techniques in Android and iOS apps
ACW Beijnum - 2023 - essay.utwente.nl
Although mobile operating systems employ a variety of features to sandbox and isolate
apps, these are not always sufficient. Because of this, app developers are recommended to …
apps, these are not always sufficient. Because of this, app developers are recommended to …
Super Root: A New Stealthy Rooting Technique on ARM Devices
Root attack is an unauthorized process of gaining the highest privilege by exploiting the
vulnerabilities of a system. After that, attackers can fully control the system, arbitrarily access …
vulnerabilities of a system. After that, attackers can fully control the system, arbitrarily access …
On Root Detection Strategies for Android Devices
R Bialon - arXiv preprint arXiv:2012.01812, 2020 - arxiv.org
The Android operating system runs on the majority of smartphones nowadays. Its success is
driven by its availability to a variety of smartphone hardware vendors on the one hand, and …
driven by its availability to a variety of smartphone hardware vendors on the one hand, and …