The rise of obfuscated Android malware and impacts on detection methods

WF Elsersy, A Feizollah, NB Anuar - PeerJ Computer Science, 2022 - peerj.com
The various application markets are facing an exponential growth of Android malware. Every
day, thousands of new Android malware applications emerge. Android malware hackers …

Toward engineering a secure android ecosystem: A survey of existing techniques

M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng… - ACM Computing …, 2016 - dl.acm.org
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …

An empirical assessment of global COVID-19 contact tracing applications

R Sun, W Wang, M Xue, G Tyson… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
The rapid spread of COVID-19 has made manual contact tracing difficult. Thus, various
public health authorities have experimented with automatic contact tracing using mobile …

Charm: Facilitating dynamic analysis of device drivers of mobile systems

SMS Talebi, H Tavakoli, H Zhang, Z Zhang… - 27th USENIX Security …, 2018 - usenix.org
Mobile systems, such as smartphones and tablets, incorporate a diverse set of I/O devices,
such as camera, audio devices, GPU, and sensors. This in turn results in a large number of …

{KOOBE}: Towards facilitating exploit generation of kernel {Out-Of-Bounds} write vulnerabilities

W Chen, X Zou, G Li, Z Qian - 29th USENIX Security Symposium …, 2020 - usenix.org
The monolithic nature of modern OS kernels leads to a constant stream of bugs being
discovered. It is often unclear which of these bugs are worth fixing, as only a subset of them …

Hardware-based malware detection using low-level architectural features

M Ozsoy, KN Khasawneh, C Donovick… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Security exploits and ensuant malware pose an increasing challenge to computing systems
as the variety and complexity of attacks continue to increase. In response, software-based …

Challenges and pitfalls in malware research

M Botacin, F Ceschin, R Sun, D Oliveira, A Grégio - Computers & Security, 2021 - Elsevier
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …

{PARTEMU}: Enabling Dynamic Analysis of {Real-World}{TrustZone} Software Using Emulation

L Harrison, H Vijayakumar, R Padhye, K Sen… - 29th USENIX Security …, 2020 - usenix.org
ARM's TrustZone technology is the basis for security of billions of devices worldwide,
including Android smartphones and IoT devices. Because TrustZone has access to sensitive …

Adaptive android kernel live patching

Y Chen, Y Zhang, Z Wang, L Xia, C Bao… - 26th USENIX Security …, 2017 - usenix.org
Android kernel vulnerabilities pose a serious threat to user security and privacy. They allow
attackers to take full control over victim devices, install malicious and unwanted apps, and …

A root privilege management scheme with revocable authorization for Android devices

Y Tan, Y Xue, C Liang, J Zheng, Q Zhang… - Journal of Network and …, 2018 - Elsevier
As a critical part in mobile cloud computing, the vulnerability of Android devices can directly
affect the security of the mobile cloud. The unsecured Android can be potentially exploited …