A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Mystique
2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16
Thus, it is desired to conduct a systematic investigation and evaluation of anti-malware solutions and tools based on different attacks and evasion techniques. ...
With the help of MYSTIQUE, we conduct experiments to 1) understand Android malware and the associated attack features as well as evasion techniques; 2) evaluate and compare the 57 off-the-shelf anti-malware ...
This work is also sponsored by the National Science Foundation of China (No. 61572349, 61272106) . ...
doi:10.1145/2897845.2897856
dblp:conf/ccs/MengXCN0ZC16
fatcat:ssubdviipffe3k5lc7ue2evzu4
Malware Analysis and Detection on Android: The Big Challenge
[chapter]
2017
Smartphones from an Applied Research Perspective
We start by briefly describing the Android's security model, followed by a discussion of the static and dynamic malware analysis techniques in order to provide a general view of the analysis and detection ...
The main contribution of this chapter is a description of the realization of static and dynamic malware analysis techniques and principles that can be automated and mapped to software system tools in order ...
y Posgrado under grant numbers 1894 and 20170344. ...
doi:10.5772/intechopen.69695
fatcat:ogfid4ptu5dlnflintz4vbbcf4
Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection
2020
IEEE Access
That is why, in this paper we first perform a detailed meta-review of the existing surveys related to malware and its detection techniques, showing an arms race between these two sides of a barricade. ...
At present, the complexity, proliferation, and variety of malware pose a real challenge for the existing countermeasures and require their constant improvements. ...
The survey in [13] focused on the dynamic analysis techniques that can be used to inspect malware samples without the limitations of static tools. ...
doi:10.1109/access.2020.3048319
fatcat:tatdk6pzczgp3aylvbxoxabuta
the data needed, and completing and reviewing the collection of information. ...
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining ...
Acknowledgments This work was supported in part by CyLab at Carnegie Mellon under grant DAAD19-02-1-0389 from the Army Research Office, and by the National Science Foundation under IGERT award DGE-0903659 ...
doi:10.1145/2666620.2666630
dblp:conf/ccs/VidasTNTCT14
fatcat:ici7llzn4zafbmolrmlrpfnjkm
Information flow based defensive chain for data leakage detection and prevention: a survey
[article]
2021
arXiv
pre-print
Research communities and industries have proposed many Information Flow Control (IFC) techniques for data leakage detection and prevention, including secure modeling, type system, static analysis, dynamic ...
Mobile and IoT applications have greatly enriched our daily life by providing convenient and intelligent services. ...
[139] presented a survey on emerging Android malware analysis and detection techniques, along with their effectiveness against evolving malware. ...
arXiv:2106.04951v1
fatcat:apib4mmp3va43dv5he7xu3aay4
Malware Analysis in IoT & Android Systems with Defensive Mechanism
2022
Electronics
This article classifies different attacks on IoT and Android devices and mitigation strategies proposed by different researchers. ...
Android devices connect to different IoT devices such as IoT-enabled cameras, Alexa powered by Amazon, and various other sensors. ...
Ethical Approval: This article does not contain any studies with human participants performed by any of the authors. ...
doi:10.3390/electronics11152354
fatcat:saf2a2bb6rdznkbgdukxb3s4fe
An Efficient Auditing Protocol For Information Sharing And Secured Distributed Storage
2022
Zenodo
The record put away in the cloud can be shared and utilized by others dependingon the prerequisite that the touchy data of the document is ensured. ...
The security evidence and the exploratory investigation exhibit that the proposed plot accomplishes attractive security and productivity. ...
TITLE: Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique AUTHOR: Yinxing Xue, Guozhu Meng, Yang Liu, Tian Huat Tan, Hongxu Chen, Jun Sun, and Jie Zhang YEAR: 2015 ...
doi:10.5281/zenodo.7136919
fatcat:wrbndodalveqng6spsn6eisjte
Machine Learning-Based Routing and Wavelength Assignment in Software-Defined Optical Networks
2019
IEEE Transactions on Network and Service Management
AV Resilience to Anti-detection Techniques For instance, Rastogi et al [69] perform a systematic evaluation of Android antimalware products by studying their detection abilities in the presence of anti-detection ...
However, using ML, routing can be made more efficient, by dynamically tracking traffic loads and re-routing the most conflictive demands. ...
doi:10.1109/tnsm.2019.2927867
fatcat:or3lhqdqbnas3cztwkqr5ykhhq
A Survey : Data Mining and Machine Learning Methods for Cyber Security
2021
International Journal of Scientific Research in Computer Science Engineering and Information Technology
Documents representing each method were categorized, read and summarized based on the number of citations and significance of an evolving method. Since data is so important. ...
This survey paper describes the literature survey for cyber analytics in support of intrusion detection of machine learnings (ML) and data mining (DM) methods. ...
However, this focus may neglect major new and evolving techniques, so some of these papers have also been selected. ...
doi:10.32628/cseit217212
fatcat:rz6kk2ywprbi3lf7gz7msm2zxa
SoK: Lessons Learned from Android Security Research for Appified Software Platforms
2016
2016 IEEE Symposium on Security and Privacy (SP)
Android security and privacy research has boomed in recent years, far outstripping investigations of other appified platforms. ...
To put Android security and privacy research into context, we compare the concept of appification with conventional operating system and software ecosystems. ...
ACKNOWLEDGEMENTS This work was supported by the German Federal Ministry for Education and Research (BMBF) through funding for the Center for IT-Security, Privacy and Accountability (CISPA) via the projects ...
doi:10.1109/sp.2016.33
dblp:conf/sp/Acar0BFM016
fatcat:xxyvxkbjp5biflq4nypse3byam
Android inter-app communication threats and detection techniques
2017
Computers & security
Android malware authors use many anti-analysis techniques to hide from analysis tools. ...
They are making use of the combinations of static, dynamic and behavior based analysis techniques. ...
Dynamic Analysis This section briefly explains the proposed tools and techniques that conducts analysis dynamically. ...
doi:10.1016/j.cose.2017.07.002
fatcat:owzn5l7bvrcitix4mlfiabdhee
Cyber espionage through Botnets
2019
Security Journal
This history shows an evolution of the infection techniques, the scope of the target devices, and their usage. ...
Thus, the new direction is the usage of sophisticated data leakage techniques by state-sponsored hacker groups. Our article analyses this evolution while focusing on Botnet usage for cyber espionage. ...
Acknowledgements This article was supported by ERDF "CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence" (No. CZ.02.1.01/0.0/0.0/16_019/0000822). ...
doi:10.1057/s41284-019-00194-6
fatcat:irtf2ec2tjcidehkhvvn3rdmre
Responding to targeted stealthy attacks on Android using timely-captured memory dumps
2022
IEEE Access
Recent malware campaigns like Flubot demonstrate that by employing stealthy malware techniques even at minimal capacity, malware is highly effective in making its way to millions of devices with little ...
The increasing dominance of Android smartphones for everyday communication and data processing makes long-term stealthy malware an even more dangerous threat. ...
ACKNOWLEDGMENTS This work is supported by the LOCARD Project under Grant H2020-SU-SEC-2018-832735. ...
doi:10.1109/access.2022.3160531
fatcat:bl6bv6lspfdajnzxq22kxlo5gy
Google Android: A State-of-the-Art Review of Security Mechanisms
[article]
2009
arXiv
pre-print
We conclude by proposing a set of security mechanisms that should be explored and introduced into Android-powered devices. ...
The incorporation of integrated access services to the Internet on such mobile devices, however, increases their exposure to damages inflicted by various types of malware. ...
Smartphone malware evolve very quickly due to the experience virus writers have gained from the computer and Internet world. ...
arXiv:0912.5101v1
fatcat:lco6bcdjfffvdjaopqf24jmz2u
SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents
2017
Journal of Cyber Security and Mobility
Along with increasing security measures in Android platforms, the amount of Android malware that use remote exploits has grown significantly. ...
Efficient detection and defence techniques that use filtering and blocking methods for SMS botnets is therefore an urgent necessity. ...
The SMS botnet dataset collected botnet samples from the Android Genome Malware project [154] , malware security blog [36] , VirusTotal [140] , and samples provided by a well-known anti-malware vendor ...
doi:10.13052/jcsm2245-1439.523
fatcat:dkxeklymibgldpjr5fb6oebo3y
« Previous
Showing results 1 — 15 out of 187 results