Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








5 Hits in 2.0 sec

A Modified FlowDroid Based on Chi-Square Test of Permissions

Hongzhaoning Kang, Gang Liu, Zhengping Wu, Yumin Tian, Lizhi Zhang
2021 Entropy  
FlowDroid has been extensively studied as a novel and highly precise static taint analysis for Android applications.  ...  At the same time, Android applications (apps) always use multiple permissions, and permissions can be abused by malicious apps that disclose users' privacy or breach the secure storage of information.  ...  DAPASA [18] is an approach used to detect Android piggybacked apps through sensitive subgraph analysis.  ... 
doi:10.3390/e23020174 pmid:33573210 fatcat:ojsvpsneebh6rnaklyro2c4ziq

Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark [article]

Li Li, Tegawendé Bissyandé, Jacques Klein
2018 arXiv   pre-print
In this work, we propose to reboot the research in repackaged app detection by providing a literature review that summarises the challenges and current solutions for detecting repackaged apps and by providing  ...  Repackaging is a serious threat to the Android ecosystem as it deprives app developers of their benefits, contributes to spreading malware on users' devices, and increases the workload of market maintainers  ...  [21] Supervised Learning coefficient/distance of sensitive subgraph/motifs DR-Droid2 [20] Supervised Learning user interactions, sensitive APIs, permissions DR-Droid [28] Supervised Learning user  ... 
arXiv:1811.08520v1 fatcat:zjpauswnn5fprdqdnetp3zbhfu

Software engineering techniques for statically analyzing mobile apps: research trends, characteristics, and potential for industrial adoption

Marco Autili, Ivano Malavolta, Alexander Perucci, Gian Luca Scoccia, Roberto Verdecchia
2021 Journal of Internet Services and Applications  
of mobile apps.  ...  Static analysis is gaining a growing interest, allowing developers to predict properties about the run-time behavior of mobile apps without executing them.  ...  We established the need for performing a review on static analysis of mobile app (Section 3), we identified the main research questions (Section 4.1), and we defined the protocol to be followed by the  ... 
doi:10.1186/s13174-021-00134-x fatcat:mlzjbkdi7fhezisn3tcv7wzlbi

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection [article]

Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren
2018 arXiv   pre-print
Machine learning based solutions have been successfully employed for automatic detection of malware in Android applications.  ...  In this paper, we introduce a new highly-effective attack that generates adversarial examples of Android malware and evades being detected by the current models.  ...  [15] proposed DAPASA, an approach to detect Android piggybacked applications through sensitive subgraph analysis. Xu et al.  ... 
arXiv:1808.04218v3 fatcat:iwy54k7zgbf6zb5im6ocv7hdpa

An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs

Haojie Wu, Nurbol Luktarhan, Gaoqi Tian, Yangyang Song
2023
Next, we calculate the API coefficient inspired by the idea of the TF-IDF algorithm and extract the sensitive function called subgraph (S-FCSG) based on API coefficient ranking.  ...  In our work, we propose an Android malware detection approach to enhance node feature differences in an FCG.  ...  [16] proposed an approach to detect Android piggybacked apps called DAPASA.  ... 
doi:10.3390/s23104729 pmid:37430643 pmcid:PMC10224091 fatcat:ofm2b7dgffgavo3jlyc26f3bny