Deep learning for android malware defenses: a systematic literature review
Malicious applications (particularly those targeting the Android platform) pose a serious
threat to developers and end-users. Numerous research efforts have been devoted to …
threat to developers and end-users. Numerous research efforts have been devoted to …
Less is More: A privacy-respecting Android malware classifier using federated learning
In this paper we present LiM (" Less is More"), a malware classification framework that
leverages Federated Learning to detect and classify malicious apps in a privacy-respecting …
leverages Federated Learning to detect and classify malicious apps in a privacy-respecting …
Circumventing Google Play vetting policies: A stealthy cyberattack that uses incremental updates to breach privacy
Z Muhammad, F Amjad, Z Iqbal, AR Javed… - Journal of Ambient …, 2023 - Springer
Today digital technologies are evolving to accommodate small businesses and young
entrepreneurs by reducing their time-to-market while encouraging rapid innovation in …
entrepreneurs by reducing their time-to-market while encouraging rapid innovation in …
Perbandingan Kinerja Akurasi Klasifikasi K-NN, NB Dan DT Pada APK Android
D Hindarto - JATISI (Jurnal Teknik Informatika Dan Sistem …, 2022 - jurnal.mdp.ac.id
Today many people use Internet technology, for various needs. Starting from shopping,
transportation and education, using the Internet as a digital service. Equipment in accessing …
transportation and education, using the Internet as a digital service. Equipment in accessing …
[HTML][HTML] Reducing the forensic footprint with Android accessibility attacks
Android accessibility features include a robust set of tools allowing developers to create
apps for assisting people with disabilities. Unfortunately, this useful set of tools can also be …
apps for assisting people with disabilities. Unfortunately, this useful set of tools can also be …
[PDF][PDF] 一种基于诱导机制的间谍软件检测方法
郭春, 罗迪, 申国伟, 崔允贺, 平源 - 电子学报, 2022 - ejournal.org.cn
间谍软件是攻击者广泛采用的一类信息窃取类恶意软件, 具有高威胁性, 高隐蔽性等特点.
间谍软件在实施窃密行为时通常采用触发执行策略, 使得基于软件行为的动态检测方法难以在短 …
间谍软件在实施窃密行为时通常采用触发执行策略, 使得基于软件行为的动态检测方法难以在短 …
Security code smells in apps: are we getting better?
S Arzt - Proceedings of the 30th ACM Joint European Software …, 2022 - dl.acm.org
Users increasingly rely on mobile apps for everyday tasks, including security-and privacy-
sensitive tasks such as online banking, e-health, and e-government. Additionally, a wealth of …
sensitive tasks such as online banking, e-health, and e-government. Additionally, a wealth of …
An evolutionary perspective: a study of Anubis Android banking trojan
Anubis Android banking trojan has been widespread worldwide which caused millions of
economy loss while it has been evolving both numerically and swiftly. To chase with the …
economy loss while it has been evolving both numerically and swiftly. To chase with the …
Malware detection inside app stores based on lifespan measurements
C Cilleruelo, L De-Marcos, JJ Martinez-Herráiz - IEEE Access, 2021 - ieeexplore.ieee.org
Potentially Harmful Apps (PHAs), like any other type of malware, are a problem. Even
though Google tries to maintain a clean app ecosystem, Google Play Store is still one of the …
though Google tries to maintain a clean app ecosystem, Google Play Store is still one of the …
[PDF][PDF] Permission-based android malware detection using machine learning
S Seraj - 2023 - research.brighton.ac.uk
Mobile devices, particularly Android-based devices, have become essential to our daily
lives. However, this trend has also increased the number and sophistication of mobile …
lives. However, this trend has also increased the number and sophistication of mobile …