The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

Evolution, detection and analysis of malware for smart devices

G Suarez-Tangil, JE Tapiador… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Smart devices equipped with powerful sensing, computing and networking capabilities have
proliferated lately, ranging from popular smartphones and tablets to Internet appliances …

Aff-wild: valence and arousal'In-the-Wild'challenge

S Zafeiriou, D Kollias, MA Nicolaou… - Proceedings of the …, 2017 - openaccess.thecvf.com
Abstract The Affect-in-the-Wild (Aff-Wild) Challenge proposes a new comprehensive
benchmark for assessing the performance of facial affect/behaviour analysis …

Madam: Effective and efficient behavior-based android malware detection and prevention

A Saracino, D Sgandurra, G Dini… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Android users are constantly threatened by an increasing number of malicious applications
(apps), generically called malware. Malware constitutes a serious threat to user privacy …

An Exhibition of Hidden Stories: The Young Voices Soundscape-Examining Sound and Silence as a Collective Experience in Sound Art Installation

P Demetriou - HARTS & Minds, 2014 - research-information.bris.ac.uk
In this paper I explore the concepts of sound and silence focusing upon creative modalities
for the dissemination of oral history materials. In doing so I focus upon two sound …

Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones

W Enck, P Gilbert, S Han, V Tendulkar… - ACM Transactions on …, 2014 - dl.acm.org
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …

Unsafe exposure analysis of mobile in-app advertisements

MC Grace, W Zhou, X Jiang, AR Sadeghi - Proceedings of the fifth ACM …, 2012 - dl.acm.org
In recent years, there has been explosive growth in smartphone sales, which is
accompanied with the availability of a huge number of smartphone applications (or simply …

Aurasium: Practical policy enforcement for android applications

R Xu, H Saïdi, R Anderson - 21st USENIX Security Symposium (USENIX …, 2012 - usenix.org
The increasing popularity of Google's mobile platform Android makes it the prime target of
the latest surge in mobile malware. Most research on enhancing the platform's security and …

[PDF][PDF] Security enhanced (se) android: bringing flexible mac to android.

S Smalley, R Craig - Ndss, 2013 - cs.columbia.edu
The Android software stack for mobile devices defines and enforces its own security model
for apps through its application-layer permissions model. However, at its foundation, Android …

Flexible and fine-grained mandatory access control on android for diverse security and privacy policies

S Bugiel, S Heuser, AR Sadeghi - 22nd USENIX Security Symposium …, 2013 - usenix.org
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …