Structural attack against graph based android malware detection
Malware detection techniques achieve great success with deeper insight into the semantics
of malware. Among existing detection techniques, function call graph (FCG) based methods …
of malware. Among existing detection techniques, function call graph (FCG) based methods …
Freely given consent? studying consent notice of third-party tracking and its violations of gdpr in android apps
Adopted in May 2018, the European Union's General Data Protection Regulation (GDPR)
requires the consent for processing users' personal data to be freely given, specific …
requires the consent for processing users' personal data to be freely given, specific …
Happer: Unpacking android apps via a hardware-assisted approach
Malware authors are abusing packers (or runtime-based obfuscators) to protect malicious
apps from being analyzed. Although many unpacking tools have been proposed, they can …
apps from being analyzed. Although many unpacking tools have been proposed, they can …
All your app links are belong to us: understanding the threats of instant apps based attacks
Android deep link is a URL that takes users to a specific page of a mobile app, enabling
seamless user experience from a webpage to an app. Android app link, a new type of deep …
seamless user experience from a webpage to an app. Android app link, a new type of deep …
Software engineering for openharmony: A research roadmap
Mobile software engineering has been a hot research topic for decades. Our fellow
researchers have proposed various approaches (with over 7,000 publications for Android …
researchers have proposed various approaches (with over 7,000 publications for Android …
Scalably detecting third-party Android libraries with two-stage bloom filtering
Third-party library (TPL) detection is important for Android app security analysis nowadays.
Unfortunately, the existing techniques often suffer from poor scalability. In some situations …
Unfortunately, the existing techniques often suffer from poor scalability. In some situations …
Demystifying diehard android apps
Smartphone vendors are using multiple methods to kill processes of Android apps to reduce
the battery consumption. This motivates developers to find ways to extend the liveness time …
the battery consumption. This motivates developers to find ways to extend the liveness time …
Measuring user perception for detecting unexpected access to sensitive resource in mobile apps
Understanding users' perception of app behaviors is an important step to detect data access
that violates user expectations. While existing works have used various proxies to infer user …
that violates user expectations. While existing works have used various proxies to infer user …
TIM: Enabling Large-scale White-box Testing on In-App Deep Learning Models
Intelligent Applications (iApps), equipped with in-App deep learning (DL) models, are
emerging to provide reliable DL inference services. However, in-App DL models are …
emerging to provide reliable DL inference services. However, in-App DL models are …
Sensitive Behavioral Chain-focused Android Malware Detection Fused with AST Semantics
The proliferation of Android malware poses a substantial security threat to mobile devices.
Thus, achieving efficient and accurate malware detection and malware family identification …
Thus, achieving efficient and accurate malware detection and malware family identification …