A survey and evaluation of android-based malware evasion techniques and detection frameworks

P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun… - Information, 2023 - mdpi.com
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …

The rise of obfuscated Android malware and impacts on detection methods

WF Elsersy, A Feizollah, NB Anuar - PeerJ Computer Science, 2022 - peerj.com
The various application markets are facing an exponential growth of Android malware. Every
day, thousands of new Android malware applications emerge. Android malware hackers …

An empirical evaluation of GDPR compliance violations in Android mHealth apps

M Fan, L Yu, S Chen, H Zhou, X Luo… - 2020 IEEE 31st …, 2020 - ieeexplore.ieee.org
The purpose of the General Data Protection Regulation (GDPR) is to provide improved
privacy protection. If an app controls personal data from users, it needs to be compliant with …

Dexhunter: toward extracting hidden code from packed android applications

Y Zhang, X Luo, H Yin - … --ESORICS 2015: 20th European Symposium on …, 2015 - Springer
The rapid growth of mobile application (or simply app) economy provides lucrative and
profitable targets for hackers. Among OWASP's top ten mobile risks for 2014, the lack of …

Can we trust the privacy policies of android apps?

L Yu, X Luo, X Liu, T Zhang - 2016 46th Annual IEEE/IFIP …, 2016 - ieeexplore.ieee.org
Recent years have witnessed the sharp increase of malicious apps that steal users' personal
information. To address users' concerns about privacy risks, more and more apps are …

Understanding the evolution of android app vulnerabilities

J Gao, L Li, P Kong, TF Bissyandé… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The Android ecosystem today is a growing universe of a few billion devices, hundreds of
millions of users and millions of applications targeting a wide range of activities where …

Malton: Towards {On-Device}{Non-Invasive} Mobile Malware Analysis for {ART}

L Xue, Y Zhou, T Chen, X Luo, G Gu - 26th USENIX Security Symposium …, 2017 - usenix.org
It's an essential step to understand malware's behaviors for developing effective solutions.
Though a number of systems have been proposed to analyze Android malware, they have …

Fuzzing with data dependency information

A Mantovani, A Fioraldi… - 2022 IEEE 7th European …, 2022 - ieeexplore.ieee.org
Recent advances in fuzz testing have introduced several forms of feedback mechanisms,
motivated by the fact that for a large range of programs and libraries, edgecoverage alone is …

Enhancing the description-to-behavior fidelity in android apps with privacy policy

L Yu, X Luo, C Qian, S Wang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Since more than 96 percent of mobile malware targets the Android platform, various
techniques based on static code analysis or dynamic behavior analysis have been …

Happer: Unpacking android apps via a hardware-assisted approach

L Xue, H Zhou, X Luo, Y Zhou, Y Shi… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Malware authors are abusing packers (or runtime-based obfuscators) to protect malicious
apps from being analyzed. Although many unpacking tools have been proposed, they can …