Results 201 to 210 of about 20,046 (244)
Some of the next articles are maybe not open access.

Android application security: detecting Android malware and evaluating anti-malware software

International Journal of Internet Technology and Secured Transactions, 2020
Mobile devices have become widespread computing technology, people prefer to use than desktop devices. These connected devices and their features like an exchange of data, video calling etc. have made our lives simple but, this has also increased data security concerns. At present, Google's Android is dominating the market share of mobile devices; as a
Sangeeta Rani, Kanwalvir Singh Dhindsa
openaire   +1 more source

Android Malware Detection

2020
Smartphones and mobile tablets are rapidly becoming essential in daily life. Android has been the most popular mobile operating system since 2012. However, owing to the open nature of Android, countless malwares are intermingled with a large number of benign apps in Android markets that seriously threaten Android security.
Shymala Gowri Selvaganapathy   +5 more
openaire   +1 more source

Identifying Android malware instructions

2014 IEEE Latin-America Conference on Communications (LATINCOM), 2014
Android is a very attractive platform for malware developers because it is widely used. There is a need to understand how malware works and how it can exploit a system's security architecture. To do so, this work decompiles Android malware applications to study their source code and to look for patterns, regarding instructions, method calls, and ...
Laura Victoria Morales Medina   +1 more
openaire   +1 more source

Android Malware Detection

2022
For the past few decades, the growth in usage of mobile phones has been increasing abnormally. Recent surveys hypothesize most of the mobile phone market segment is benignly dominated by Android Operating System and this made the Android OS (Operating System) the most vulnerable Operating System; as more users are adopting to use Android OS (Operating ...
Gadde, Sayi Rosshhun   +4 more
openaire   +1 more source

Android malware detection

Malware is one of the major issues regarding the operating framework or in thesoftware world. The android framework is also going through the same issues. We have seenother Signature based malware location strategies were utilized to recognize malware. Yet, thestrategies couldn't recognize obscure malware.
Aaditya Vikram Saravana Bhavan   +5 more
openaire   +2 more sources

Classifying Android Malware through Subgraph Mining

2014
Current smartphones are based upon the concept of apps, which are lightweight applications that are distributed through on-line marketplaces, such as Google Play (for Android devices). Unfortunately, this market-centric model is affected by several major security and trust issues, due to the fact that anyone can easily create, and deploy through the ...
Fabio Martinelli   +2 more
openaire   +3 more sources

Fingerprinting Android Malware Packages

2021
A fuzzy (hashing) or approximate fingerprint of binary software is a digest that captures its static content, in similar manner to cryptographic hashing fingerprints such as MD5 and SHA1. Still, the fuzzy fingerprint change is virtually linear to the change in the binary content. In other words, smaller changes in the static content of the malware will
ElMouatez Billah Karbab   +3 more
openaire   +1 more source

Android malware classification method

Proceedings of the 2013 Research in Adaptive and Convergent Systems, 2013
The number of Android malware is increasing with the growth of Android, so there needs to have a method to classify malware families. There are many classification methods proposed so far, but most of them are based on permission information such as the number of requested permissions and critical permissions.
Byeongho Kang   +3 more
openaire   +1 more source

Fingerprinting Android malware families

Frontiers of Computer Science, 2018
The domination of the Android operating system in the market share of smart terminals has engendered increasing threats of malicious applications (apps). Research on Android malware detection has received considerable attention in academia and the industry.
Nannan Xie   +3 more
openaire   +1 more source

Composition-Malware: Building Android Malware at Run Time

2015 10th International Conference on Availability, Reliability and Security, 2015
We present a novel model of malware for Android, named composition-malware, which consists of composing fragments of code hosted on different and scattered locations at run time. An key feature of the model is that the malicious behavior could dynamically change and the payload could be activated under logic or temporal conditions.
Gerardo Canfora   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy