Results 161 to 170 of about 16,685 (199)
Some of the next articles are maybe not open access.
Classifying Android Malware through Subgraph Mining
2014Current smartphones are based upon the concept of apps, which are lightweight applications that are distributed through on-line marketplaces, such as Google Play (for Android devices). Unfortunately, this market-centric model is affected by several major security and trust issues, due to the fact that anyone can easily create, and deploy through the ...
Fabio Martinelli +2 more
openaire +3 more sources
Fingerprinting Android Malware Packages
2021A fuzzy (hashing) or approximate fingerprint of binary software is a digest that captures its static content, in similar manner to cryptographic hashing fingerprints such as MD5 and SHA1. Still, the fuzzy fingerprint change is virtually linear to the change in the binary content. In other words, smaller changes in the static content of the malware will
ElMouatez Billah Karbab +3 more
openaire +1 more source
Android malware classification method
Proceedings of the 2013 Research in Adaptive and Convergent Systems, 2013The number of Android malware is increasing with the growth of Android, so there needs to have a method to classify malware families. There are many classification methods proposed so far, but most of them are based on permission information such as the number of requested permissions and critical permissions.
Byeongho Kang +3 more
openaire +1 more source
Fingerprinting Android malware families
Frontiers of Computer Science, 2018The domination of the Android operating system in the market share of smart terminals has engendered increasing threats of malicious applications (apps). Research on Android malware detection has received considerable attention in academia and the industry.
Nannan Xie +3 more
openaire +1 more source
Composition-Malware: Building Android Malware at Run Time
2015 10th International Conference on Availability, Reliability and Security, 2015We present a novel model of malware for Android, named composition-malware, which consists of composing fragments of code hosted on different and scattered locations at run time. An key feature of the model is that the malicious behavior could dynamically change and the payload could be activated under logic or temporal conditions.
Gerardo Canfora +3 more
openaire +2 more sources
Android malware and mitigations
Network Security, 2012Just as the ubiquitous nature of Windows made it an enticing target for malware writers and cyber-criminals, so it is with Android. The maliciously inclined have not been slow to exploit the popularity of the platform. Steve Mansfield-Devine examines the nature of the malware problem and how Google's open approach to distribution makes implementing ...
openaire +1 more source
2023 World Conference on Communication & Computing (WCONF), 2023
N Gagan +4 more
openaire +1 more source
N Gagan +4 more
openaire +1 more source
Identifying Android Malware Families Using Android-Oriented Metrics
2019 IEEE International Conference on Big Data (Big Data), 2019Android malware (malicious apps) families share common attributes and behavior through sharing core malicious code. However, as the number of new malware increases, the task of identifying the correct family becomes more challenging. Two prominent approaches tackle this problem, either using dynamic analysis that captures the runtime behavior of the ...
William Blanc +3 more
openaire +1 more source
CNN-Based Android Malware Detection
2017 International Conference on Software Security and Assurance (ICSSA), 2017The growth in mobile devices has exponentially increased, making information easy to access but at the same time vulnerable. Malicious applications can gain access to sensitive and critical user information by exploiting unsolicited permission controls.
Meenu Ganesh +5 more
openaire +1 more source
Android malware analysis and conceptual malware mitigation approaches
2016 International Conference on Information and Communication Technology Convergence (ICTC), 2016Mobile devices have enjoyed unprecedented growth in the last decade. As devices become more ubiquitous and users place more sensitive data on their devices, the amount of mobile malware in the wild has grown. In order to protect mobile device users and their data, mobile security solutions have been brought to market for consumer and enterprise users ...
Tae Oh +4 more
openaire +1 more source

