Structural attack against graph based android malware detection

K Zhao, H Zhou, Y Zhu, X Zhan, K Zhou, J Li… - Proceedings of the …, 2021 - dl.acm.org
Malware detection techniques achieve great success with deeper insight into the semantics
of malware. Among existing detection techniques, function call graph (FCG) based methods …

Freely given consent? studying consent notice of third-party tracking and its violations of gdpr in android apps

TT Nguyen, M Backes, B Stock - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Adopted in May 2018, the European Union's General Data Protection Regulation (GDPR)
requires the consent for processing users' personal data to be freely given, specific …

Happer: Unpacking android apps via a hardware-assisted approach

L Xue, H Zhou, X Luo, Y Zhou, Y Shi… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Malware authors are abusing packers (or runtime-based obfuscators) to protect malicious
apps from being analyzed. Although many unpacking tools have been proposed, they can …

All your app links are belong to us: understanding the threats of instant apps based attacks

Y Tang, Y Sui, H Wang, X Luo, H Zhou… - Proceedings of the 28th …, 2020 - dl.acm.org
Android deep link is a URL that takes users to a specific page of a mobile app, enabling
seamless user experience from a webpage to an app. Android app link, a new type of deep …

Software engineering for openharmony: A research roadmap

L Li, X Gao, H Sun, C Hu, X Sun, H Wang, H Cai… - arXiv preprint arXiv …, 2023 - arxiv.org
Mobile software engineering has been a hot research topic for decades. Our fellow
researchers have proposed various approaches (with over 7,000 publications for Android …

Scalably detecting third-party Android libraries with two-stage bloom filtering

J Huang, B Xue, J Jiang, W You… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Third-party library (TPL) detection is important for Android app security analysis nowadays.
Unfortunately, the existing techniques often suffer from poor scalability. In some situations …

Demystifying diehard android apps

H Zhou, H Wang, Y Zhou, X Luo, Y Tang… - Proceedings of the 35th …, 2020 - dl.acm.org
Smartphone vendors are using multiple methods to kill processes of Android apps to reduce
the battery consumption. This motivates developers to find ways to extend the liveness time …

Measuring user perception for detecting unexpected access to sensitive resource in mobile apps

TT Nguyen, DC Nguyen, M Schilling, G Wang… - Proceedings of the …, 2021 - dl.acm.org
Understanding users' perception of app behaviors is an important step to detect data access
that violates user expectations. While existing works have used various proxies to infer user …

TIM: Enabling Large-scale White-box Testing on In-App Deep Learning Models

H Wu, Y Gong, X Ke, H Liang, F Xu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Intelligent Applications (iApps), equipped with in-App deep learning (DL) models, are
emerging to provide reliable DL inference services. However, in-App DL models are …

Sensitive Behavioral Chain-focused Android Malware Detection Fused with AST Semantics

J Gong, W Niu, S Li, M Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The proliferation of Android malware poses a substantial security threat to mobile devices.
Thus, achieving efficient and accurate malware detection and malware family identification …