Results 201 to 210 of about 20,046 (244)
Some of the next articles are maybe not open access.
Android application security: detecting Android malware and evaluating anti-malware software
International Journal of Internet Technology and Secured Transactions, 2020Mobile devices have become widespread computing technology, people prefer to use than desktop devices. These connected devices and their features like an exchange of data, video calling etc. have made our lives simple but, this has also increased data security concerns. At present, Google's Android is dominating the market share of mobile devices; as a
Sangeeta Rani, Kanwalvir Singh Dhindsa
openaire +1 more source
2020
Smartphones and mobile tablets are rapidly becoming essential in daily life. Android has been the most popular mobile operating system since 2012. However, owing to the open nature of Android, countless malwares are intermingled with a large number of benign apps in Android markets that seriously threaten Android security.
Shymala Gowri Selvaganapathy +5 more
openaire +1 more source
Smartphones and mobile tablets are rapidly becoming essential in daily life. Android has been the most popular mobile operating system since 2012. However, owing to the open nature of Android, countless malwares are intermingled with a large number of benign apps in Android markets that seriously threaten Android security.
Shymala Gowri Selvaganapathy +5 more
openaire +1 more source
Identifying Android malware instructions
2014 IEEE Latin-America Conference on Communications (LATINCOM), 2014Android is a very attractive platform for malware developers because it is widely used. There is a need to understand how malware works and how it can exploit a system's security architecture. To do so, this work decompiles Android malware applications to study their source code and to look for patterns, regarding instructions, method calls, and ...
Laura Victoria Morales Medina +1 more
openaire +1 more source
2022
For the past few decades, the growth in usage of mobile phones has been increasing abnormally. Recent surveys hypothesize most of the mobile phone market segment is benignly dominated by Android Operating System and this made the Android OS (Operating System) the most vulnerable Operating System; as more users are adopting to use Android OS (Operating ...
Gadde, Sayi Rosshhun +4 more
openaire +1 more source
For the past few decades, the growth in usage of mobile phones has been increasing abnormally. Recent surveys hypothesize most of the mobile phone market segment is benignly dominated by Android Operating System and this made the Android OS (Operating System) the most vulnerable Operating System; as more users are adopting to use Android OS (Operating ...
Gadde, Sayi Rosshhun +4 more
openaire +1 more source
Malware is one of the major issues regarding the operating framework or in thesoftware world. The android framework is also going through the same issues. We have seenother Signature based malware location strategies were utilized to recognize malware. Yet, thestrategies couldn't recognize obscure malware.
Aaditya Vikram Saravana Bhavan +5 more
openaire +2 more sources
Aaditya Vikram Saravana Bhavan +5 more
openaire +2 more sources
Classifying Android Malware through Subgraph Mining
2014Current smartphones are based upon the concept of apps, which are lightweight applications that are distributed through on-line marketplaces, such as Google Play (for Android devices). Unfortunately, this market-centric model is affected by several major security and trust issues, due to the fact that anyone can easily create, and deploy through the ...
Fabio Martinelli +2 more
openaire +3 more sources
Fingerprinting Android Malware Packages
2021A fuzzy (hashing) or approximate fingerprint of binary software is a digest that captures its static content, in similar manner to cryptographic hashing fingerprints such as MD5 and SHA1. Still, the fuzzy fingerprint change is virtually linear to the change in the binary content. In other words, smaller changes in the static content of the malware will
ElMouatez Billah Karbab +3 more
openaire +1 more source
Android malware classification method
Proceedings of the 2013 Research in Adaptive and Convergent Systems, 2013The number of Android malware is increasing with the growth of Android, so there needs to have a method to classify malware families. There are many classification methods proposed so far, but most of them are based on permission information such as the number of requested permissions and critical permissions.
Byeongho Kang +3 more
openaire +1 more source
Fingerprinting Android malware families
Frontiers of Computer Science, 2018The domination of the Android operating system in the market share of smart terminals has engendered increasing threats of malicious applications (apps). Research on Android malware detection has received considerable attention in academia and the industry.
Nannan Xie +3 more
openaire +1 more source
Composition-Malware: Building Android Malware at Run Time
2015 10th International Conference on Availability, Reliability and Security, 2015We present a novel model of malware for Android, named composition-malware, which consists of composing fragments of code hosted on different and scattered locations at run time. An key feature of the model is that the malicious behavior could dynamically change and the payload could be activated under logic or temporal conditions.
Gerardo Canfora +3 more
openaire +2 more sources

