Skip to content

Latest commit

 

History

History
601 lines (502 loc) · 37.7 KB

android_malware_technique.md

File metadata and controls

601 lines (502 loc) · 37.7 KB

[ { "abstract": "malware attacks. ... analyze different malware detection techniques used for mobile operating ... two competing mobile operating systems – Android and iOS.", "title": "[PDF] malware detection techniques for mobile devices - arXiv", https://arxiv.org/pdf/1801.02837 },

{ "abstract": "13 Feb 2018 ... phishing attacks on mobile systems in light, and to make people aware of ... Malware, Phishing, Anti-Phishing, Mobile Device, Mobile Application ... tems with 99.6% market share distributed as 81.7% for Android and 17.9% for.", "title": "[PDF] Phishing Techniques in Mobile Devices - arXiv", https://arxiv.org/pdf/1802.04501 },

{ "abstract": "in the number of malwares attacking these devices [3]. Researchers have established two methods of malware detection. The first type is the static analysis [4] ...", "title": "[PDF] Malware Detection Approach for Android systems Using ... - arXiv", https://arxiv.org/pdf/1709.08805 },

{ "abstract": "Finally, as shown by our empirical analysis on a popular Android malware detection ... about its security properties against adversarial attacks? To partially ... techniques and methodologies towards providing global ex- planations about the ...", "title": "[PDF] Explaining Black-box Android Malware Detection - arXiv", https://arxiv.org/pdf/1803.03544 },

{ "abstract": "24 Jan 2018 ... the largest measurement of Android malware behavior to date, analyzing over 1.2 million .... We also find that the use of obfuscation techniques dramatically ..... to certain attack goals as characterized in [43]. In particular,.", "title": "[PDF] Eight Years of Rider Measurement in the Android Malware ... - arXiv", https://arxiv.org/pdf/1801.08115 },

{ "abstract": "21 Sep 2017 ... Android malware authors use many anti-analysis techniques to hide from ... escalation attacks, privacy leakage and collusion attacks. We cover ...", "title": "[PDF] Android Inter-App Communication Threats and Detection Techniques", https://arxiv.org/pdf/1611.10076 },

{ "abstract": "24 Aug 2018 ... the proposed methods [16], machine learning based solutions have been ... attack that generates adversarial malware examples in Android.", "title": "[PDF] Android HIV: A Study of Repackaging Malware for Evading ... - arXiv", https://arxiv.org/pdf/1808.04218 },

{ "abstract": "15 Nov 2017 ... these techniques are vulnerable to transformation attacks. [14] and could be ... We developed a dynamic Android malware detection framework,.", "title": "[PDF] Android Malware Detection using Markov Chain Model of ... - arXiv", https://arxiv.org/pdf/1711.05731 },

{ "abstract": "30 Nov 2016 ... Mobile devices are very attractive attack surface for cyber thieves as ... Android malware authors use many anti-analysis techniques to hide ...", "title": "Android Inter-App Communication Threats and Detection Techniques", https://arxiv.org/abs/1611.10076 },

{ "abstract": "detection technique called Personal Mobile Malware Guard –. PMMG- that ... Trojan are used to help attacking a system by ... To mitigate malware attacks, we should be aware of ..... Android Malware Through Static Analysis,” Fse 2014, pp.", "title": "[PDF] a mobile malware detection technique based on user's ... - arXiv", https://arxiv.org/pdf/1802.04328 },

{ "abstract": "research advocates to utilize the techniques used by Malware to harden the tools in a similar ... Android phones which many of us are dependent upon heavily for our daily lives. ... becoming victims of attacks by Malware as part of the latter's.", "title": "[PDF] PDF only - arXiv", https://arxiv.org/pdf/1801.01970 },

{ "abstract": "31 Oct 2017 ... learning is one of the most promising techniques in detecting mobile ... Therefore, with Android's policy of open-source kernel, malware writers ...", "title": "[PDF] Automated Poisoning Attacks and Defenses in Malware Detection ...", https://arxiv.org/pdf/1706.04146 },

{ "abstract": "survey on malwares and its detection techniques. General ... recent increase in malware attacks against mobile devices based on Android and Apple iOS [6].", "title": "[PDF] Evolution and Detection of Polymorphic and Metamorphic ... - arXiv", https://arxiv.org/pdf/1406.7061 },

{ "abstract": "19 Feb 2017 ... Fuzzy-hashing fingerprints are suitable for capturing malware static features. ... there is no such fingerprinting technique that leverages dynamic analysis and would act as the first defense against Android malware attacks.", "title": "DySign: Dynamic Fingerprinting for the Automatic Detection of ...", https://arxiv.org/abs/1702.05699 },

{ "abstract": "10 Dec 2016 ... and we realize this using two novel interception techniques. The backend ... malware can still find its way to attack many Android devices.", "title": "[PDF] Monet: A User-oriented Behavior-based Malware Variants ... - arXiv", https://arxiv.org/pdf/1612.03312 },

{ "abstract": "28 Apr 2017 ... Index Terms—Android Malware Detection, Static Analysis, Secure Machine Learning, Computer ... techniques can be significantly affected by carefully-crafted attacks exploiting knowledge of the learning algorithm; e.g.,.", "title": "[PDF] A Case Study on Android Malware Detection - arXiv", https://arxiv.org/pdf/1704.08996 },

{ "abstract": "12 Mar 2018 ... deep neural networks can be fooled by evasion attacks (also referred to as ... we investigate the vulnerability of malware detection methods that use ..... learning-based detection against adversarial android malware attacks. In.", "title": "[PDF] Adversarial Malware Binaries: Evading Deep Learning for ... - arXiv", https://arxiv.org/pdf/1803.04173 },

{ "abstract": "2 Aug 2017 ... by malicious Android applications to record all touchscreen input ...... implications of the attack, techniques and ideas exploited therein.", "title": "[PDF] Using Hover to Compromise the Confidentiality of User Input ... - arXiv", https://arxiv.org/pdf/1611.01477 },

{ "abstract": "4 Sep 2017 ... ware analysis is known to fall short against techniques that change static ... mobile malware is designed to attack Android. Ac- cording to ...", "title": "[PDF] Android Malware Family Classification Based on Resource ...", https://arxiv.org/pdf/1709.00875 },

{ "abstract": "6 Jul 2017 ... Almost all ML based Android malware detection techniques. (incl. the .... privacy leak attack spans across three ADG nodes. Therefore,.", "title": "[PDF] Context-aware, Adaptive and Scalable Android Malware ... - arXiv", https://arxiv.org/pdf/1706.00947 },

{ "abstract": "international targets and eventually launch attacks if necessary. ... understanding information-hiding techniques in malware. .... Trojan:Android/FakeRegSMS.B.", "title": "[PDF] Information Hiding as a Challenge for Malware Detection - arXiv", https://arxiv.org/pdf/1504.04867 },

{ "abstract": "analysis tools, which are open source in nature, for the Android platform and .... for an attack is malware. Cybercriminals are now using attacks and techniques.", "title": "[PDF] Open Source Android Vulnerability Detection Tools: A Survey - arXiv", https://arxiv.org/pdf/1807.11840 },

{ "abstract": "6 Apr 2017 ... Meaning, some views are more amenable to detect certain attacks but may ... Most of the existing malware detection approaches use only one (or a ... that MKLDroid outperforms three state-of-the-art techniques consistently, ...", "title": "A Multi-view Context-aware Approach to Android Malware Detection ...", https://arxiv.org/abs/1704.01759 },

{ "abstract": "These methods were designed to detect malware operating on the initial versions of Android, performing simpler attacks such as making premium-rated ...", "title": "[PDF] Adaptive and Scalable Android Malware Detection through ... - arXiv", https://arxiv.org/pdf/1606.07150 },

{ "abstract": "spyware and other generic malware, ransomware attacks entirely compromise the ..... techniques could be suitable to Android malware detection. Chen et al.", "title": "[PDF] R-PackDroid: Practical On-Device Detection of Android ... - arXiv", https://arxiv.org/pdf/1805.09563 },

{ "abstract": "14 Nov 2017 ... Contaminant Removal for Android Malware Detection Systems. Lichao Sun. ∗ ... based on data mining and machine learning techniques [6],. [7], [8]. .... to attacks, Android provides ”protection Level” to help characterize the ...", "title": "[PDF] arXiv:1711.02715v2 [cs.CR] 14 Nov 2017", https://arxiv.org/pdf/1711.02715 },

{ "abstract": "28 Mar 2014 ... isting malware detection techniques, software or hardware, ... on flagging Android malicious apps by detecting payloads. Detecting malware ...", "title": "[PDF] Unsupervised Anomaly-based Malware Detection using Hardware ...", https://arxiv.org/pdf/1403.1631 },

{ "abstract": "4 Feb 2018 ... IntelliAV against common obfuscation techniques where most of the .... attack malware, namely Chrysaor, which is presumed of infecting ...", "title": "[PDF] IntelliAV: Building an Effective On-Device Android Malware Detector", https://arxiv.org/pdf/1802.01185 },

{ "abstract": "21 Feb 2016 ... ing attacks, even legitimate developers are encour- aged to obfuscate [19] their code. Similar techniques are used by an Android malware ...", "title": "[PDF] DroidNative: Semantic-Based Detection of Android Native Code ...", https://arxiv.org/pdf/1602.04693 },

{ "abstract": "11 Feb 2018 ... botnets of IoT devices, which is currently a common attack. To accomplish ... Android malware detection [24, 25], the“Cloudeye” [2] is in practice the only ... machine learning methods are expected to be suitable too because.", "title": "[PDF] Lightweight Classification of IoT Malware based on Image ... - arXiv", https://arxiv.org/pdf/1802.03714 },

{ "abstract": "26 Sep 2012 ... physically intrusive attack space by abusing the on-board sensors of a smartphone. ... However, the reconstruction techniques that ... Android for practical reasons, but we expect such malware to generalize to other platforms ...", "title": "[PDF] PlaceRaider: Virtual Theft in Physical Spaces with Smartphones", https://arxiv.org/pdf/1209.5982 },

{ "abstract": "10 Dec 2016 ... Abstract: Android, the most popular mobile OS, has around 78% of the mobile market share. Due to its popularity, it attracts many malware attacks. ... generation, and we realize this using two novel interception techniques.", "title": "Monet: A User-oriented Behavior-based Malware Variants Detection ...", https://arxiv.org/abs/1612.03312 },

{ "abstract": "3 Aug 2018 ... However, due to the evolution of attack strategies of Android malware [34] classifiers built on these features may not be sustainable—they ...", "title": "[PDF] A Preliminary Study On the Sustainability of Android Malware ... - arXiv", https://arxiv.org/pdf/1807.08221 },

{ "abstract": "4 Apr 2018 ... techniques that leverage the blockchain network. Index Terms—Malware ... Also, the Mirai DDoS attacks on IoT made headlines and derived motives ... Furthermore, new Android and iOS malware are discov- ered each day.", "title": "[PDF] Developing a K-ary malware using Blockchain - arXiv", https://arxiv.org/pdf/1804.01488 },

{ "abstract": "5 Aug 2018 ... techniques to verify the attack effectiveness and transferability. .... some Android malware samples processed by binary features. As for the ...", "title": "[PDF] Adversarial Examples: Attacks on Machine Learning-based Malware ...", https://arxiv.org/pdf/1808.01546 },

{ "abstract": "methods and Taint Analysis are deployed on the applications. ... Keywords-Android; Malware Detection; Bayesian Network; Spyware Detection; Deep Learning; Taint Analysis; ... applications and widespread attacks targeting mass users have.", "title": "[PDF] DroidMark – A Tool for Android Malware Detectionusing Taint ... - arXiv", https://arxiv.org/pdf/1805.06620 },

{ "abstract": "... App collusion detection. Keywords: Android security, App communication, App collusion, malware detection ... We will discuss state-of-art techniques on detecting. Application attacks and point out challenges in this area. The rest of paper is ...", "title": "[PDF] Android Inter-App Communication - arXiv", https://arxiv.org/pdf/1803.05039 },

{ "abstract": "However, Trojan attacks do utilise reconnaissance stage like any other cyber-attack. ... Banking Trojans are using different techniques to install themselves on a host while remain ... For example: Android malwares can perform a Cross App.", "title": "[PDF] A Cyber Kill Chain Based Taxonomy of Banking Trojans for ... - arXiv", https://arxiv.org/pdf/1807.10446 },

{ "abstract": "5 May 2017 ... Fingerprinting techniques are still in the newspapers as it appeared to .... The malicious NFC provides an URL/URI to attack the user's device ...", "title": "[PDF] Hacking Android Smartphones with NFC Tags - arXiv", https://arxiv.org/pdf/1705.02081 },

{ "abstract": "2 Jul 2013 ... (a) The number of detected Android malware in 2012. The data ..... the evolving attack strategies employed by cyber-criminals. These are ...", "title": "[PDF] Security for Smart Mobile Networks: The NEMESYS Approach - arXiv", https://arxiv.org/pdf/1307.0687 },

{ "abstract": "13 Jun 2018 ... existing malware detection techniques. KEYWORDS. Android Malware Detection; Call Grpah; Graph Convolution Net- works ... applications, but also posed challenges to defending attacks from a proliferation of malware ...", "title": "[PDF] Android Malware Detection using Large-scale Network ... - arXiv", https://arxiv.org/pdf/1806.04847 },

{ "abstract": "9 Feb 2017 ... affect both Android and iOS. Moreover, our IFL methods allow an adversary to launch the attacks remotely, without implanting malicious apps in ...", "title": "[PDF] Cross-Platform Analysis of Indirect File Leaks in Android and ... - arXiv", https://arxiv.org/pdf/1511.00104 },

{ "abstract": "2 Mar 2016 ... In the past two decades various advanced communication technologies such ... to launch a transmissive attack is simply release a malicious code (e.g., a .... vulnerability of the media library to access users' Android devices ...", "title": "[PDF] Decapitation via Digital Epidemics: A Bio-Inspired Transmissive Attack", https://arxiv.org/pdf/1603.00588 },

{ "abstract": "techniques and also individual state-of-the-art models ... malware for Windows and 19 million for Android devices ...... the scheme can detect zero-day attacks.", "title": "[PDF] Malytics: A Malware Detection Scheme - arXiv", https://arxiv.org/pdf/1803.03465 },

{ "abstract": "3 Aug 2017 ... attack using malware in an OSN can lead to tens of millions of OSN accounts ..... engineering techniques to create eye-catching web links that trick ...... [38] Y. Zhou and X. Jiang, “Dissecting android malware: Characterization.", "title": "[PDF] Modeling the Propagation of Trojan Malware in Online Social ... - arXiv", https://arxiv.org/pdf/1708.00969 },

{ "abstract": "attack on an image classifier perturbs an image so that it is perceptually no ... Neural network methods for malware detection are increas- ingly being used. ... done on a variety of file types, such as Android and PE files [5], [16], [22], [29].", "title": "[PDF] Adversarial Deep Learning for Robust Detection of Binary ... - arXiv", https://arxiv.org/pdf/1801.02950 },

{ "abstract": "30 Jul 2015 ... In this paper, I will be looking at an attack commonly ... Lastly, I will touch on the feasibility of the attack as well as mitigation strategies.", "title": "[PDF] Android Tapjacking Vulnerability - Semantic Scholar", https://arxiv.org/pdf/1507.08694 },

{ "abstract": "15 Jul 2017 ... Conventional similarity-based clustering techniques, however, cannot ... We design and implement an Android malware clustering system through ... Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017).", "title": "Android Malware Clustering through Malicious Payload Mining", https://arxiv.org/abs/1707.04795 },

{ "abstract": "19 Feb 2017 ... hashing, are the first defense line against such attacks. Fuzzy- ... novel technique for fingerprinting Android malware's dynamic behaviors.", "title": "[PDF] Dynamic Fingerprinting for the Automatic Detection of Android ...", https://arxiv.org/pdf/1702.05699 },

{ "abstract": "7 Apr 2015 ... targeted nation-state level attack against an Iranian nuclear research ... techniques and tools to detect sophisticated Android malware capable ...", "title": "[PDF] Security Toolbox for Detecting Novel and Sophisticated Android ...", https://arxiv.org/pdf/1504.01693 },

{ "abstract": "8 Apr 2017 ... more amenable to detect certain attacks but may not be suitable to .... In this section, the background on kernel methods, Android malware ...", "title": "[PDF] A Multi-view Context-aware Approach to Android Malware Detection ...", https://arxiv.org/pdf/1704.01759 },

{ "abstract": "30 Nov 2016 ... Android popularity has motivated the malware authors to employ set of cyber attacks leveraging code obfuscation techniques. Obfuscation is an ...", "title": "Android Code Protection via Obfuscation Techniques: Past, Present ...", https://arxiv.org/abs/1611.10231 },

{ "abstract": "6 Aug 2017 ... attack) by nodes correlate well with malware spread, and create dy- namic neighborhoods of ... machine learning techniques is challenging. The dominant approaches ..... new (zero-day) attacks. On Android, both system.", "title": "[PDF] Exploiting Latent Attack Semantics for Intelligent Malware ... - arXiv", https://arxiv.org/pdf/1708.01864 },

{ "abstract": "16 Feb 2018 ... and evaluate such ML based attack detection techniques, it is mandatory to have .... another Android malware dataset –[16], [7], or malware.", "title": "[PDF] WebEye– Automated Collection of Malicious HTTP Traffic - arXiv", https://arxiv.org/pdf/1802.06012 },

{ "abstract": "used to acquire access to the device and the methods that are actually used to ... Another malware family that employs social engineering attacks is the fake ...", "title": "[PDF] Evaluation of Security Solutions for Android Systems", https://arxiv.org/pdf/1502.04870 },

{ "abstract": "15 Jul 2017 ... 22], and hybrid [12] analysis based clustering techniques have been proposed in ... mediately applied for Android malware clustering because the malicious code ...... The attack and defense against malware obfusca- tion is a ...", "title": "[PDF] Android Malware Clustering through Malicious Payload Mining", https://arxiv.org/pdf/1707.04795 },

{ "abstract": "1 Aug 2018 ... Moreover, the fast-paced evolution of Android malware continuously generates derivative ..... component hijacking attacks that might cause privacy leakage. ... techniques like dynamic code loading or code obfuscation.", "title": "(PDF) Semi-supervised classification for dynamic Android malware ...", https://arxiv.org/pdf/1704.05948 },

{ "abstract": "techniques that can operate for long periods of time without the need for modifications or costly re-training. In this paper, we present MAMADROID, an Android malware detection system ...... vulnerable to older (and possibly popular) attacks.", "title": "[PDF] MAMADROID: Detecting Android Malware by Building ... - arXiv", https://arxiv.org/pdf/1612.04433 },

{ "abstract": "13 May 2018 ... standalone attacks, based on malicious touchscreen hard- ware, that function as ... attacks that can severely compromise a stock Android phone with .... to another device. (Atmel T641) using similar techniques and tools.", "title": "[PDF] When Replacement Smartphone Components Attack - arXiv", https://arxiv.org/pdf/1805.04850 },

{ "abstract": "19 Feb 2016 ... stealth malware technologies and countermeasures. There ... et al. provide a survey of generic Android security issues and defenses.", "title": "[PDF] A Survey of Stealth Malware Attacks, Mitigation Measures ... - arXiv", https://arxiv.org/pdf/1603.06028 },

{ "abstract": "showing such a large Android malware analysis/detection. The evaluation .... invoked by any other methods, signature generator will also ignore this method ...... Re-Delegation: Attacks and Defenses,” in Proceedings of the 20th. USENIX ...", "title": "[PDF] DroidAnalytics: A Signature Based Analytic System to Collect ... - arXiv", https://arxiv.org/pdf/1302.7212 },

{ "abstract": "20 Nov 2017 ... of techniques to detect malware on Android. Previous work ...... calls have to be different (otherwise there would be no attack), then the models ...", "title": "[PDF] MaMaDroid: Detecting Android Malware by Building Markov Chains ...", https://arxiv.org/pdf/1711.07477 },

{ "abstract": "malware attacks against mobile devices based on Android and Apple iOS [7]. This ... For the detection of malware by machine learning technique, feature.", "title": "[PDF] An effective approach for classification of advanced malware with ...", https://arxiv.org/pdf/1606.06897 },

{ "abstract": "5 Jan 2018 ... ... obfuscation is widely uti- lized by both legitimate app developers and malware authors, which ... most popular Android obfuscation techniques (identifier renaming, ...... Android Anti-malware against Transformation Attacks.", "title": "[PDF] Understanding Android Obfuscation Techniques: A Large ... - arXiv", https://arxiv.org/pdf/1801.01633 },

{ "abstract": "31 Mar 2018 ... security techniques, this survey aims to increase their awareness ... We include works that attack GPU or run attack-code/malware on GPU. ...... Android smart-phone with sound memory isolation and security mechanisms.", "title": "[PDF] A Survey of Techniques for Improving Security of GPUs - arXiv", https://arxiv.org/pdf/1804.00114 },

{ "abstract": "20 Feb 2017 ... they are easily to be bypassed by some adversarial techniques. Recently ... to generate adversarial Android malware examples [Grosse et.", "title": "[PDF] Generating Adversarial Malware Examples for Black-Box Attacks ...", https://arxiv.org/pdf/1702.05983 },

{ "abstract": "techniques like packing, dynamic loading, self modifying, and reflection. In this paper ... I. INTRODUCTION. With the rapid proliferation of malware attacks on mobile .... tions [22] and static analysis tools [1]–[3] on Android assume that the name ...", "title": "[PDF] DexLego: Reassembleable Bytecode Extraction for Aiding ... - arXiv", https://arxiv.org/pdf/1803.02471 },

{ "abstract": "targets of data theft attacks commonly using techniques in- ... both DNS tunneling and low throughput malware exfiltration. The input .... Android. A list of known DNS tunneling tools. Non-interactive data leakage channels (e.g., one-way credit.", "title": "[PDF] Detection of Malicious and Low Throughput Data Exfiltration ... - arXiv", https://arxiv.org/pdf/1709.08395 },

{ "abstract": "19 Oct 2016 ... signatures as malicious markers to attack the availability of benign data and ... matched using classic string-processing techniques, such as the ...... that in 2013, ten commercial Android anti-malware products can be bypassed ...", "title": "[PDF] From Malware Signatures to Anti-Virus Assisted Attacks", https://arxiv.org/pdf/1610.06022 },

{ "abstract": "Mobile devices have become a target to attacks with Android platform ... Figure 2: A Classification of Mobile Malware Detection Techniques (Source: [6]). Each of ...", "title": "[PDF] a machine learning approach to anomaly-based ... - Semantic Scholar", https://arxiv.org/pdf/1512.04122 },

{ "abstract": "techniques in order to avoid detection and this may defeat static ... Keywords— Android; malware detection; dynamic analysis; ..... attacks. Some malware apply sophisticated techniques, such as obfuscation and polymorphic techniques that ...", "title": "[PDF] DynaLog: An automated dynamic analysis framework for ... - arXiv", https://arxiv.org/pdf/1607.08166 },

{ "abstract": "commit cyber-attacks or crimes has received relatively little attention in the academic ... equip malware with information hiding capabilities, i.e., techniques that hide communications .... A paradigmatic example is a variant of Android/Twitoor.", "title": "[PDF] The New Threats of Information Hiding: the Road Ahead - arXiv", https://arxiv.org/pdf/1801.00694 },

{ "abstract": "4 Jun 2016 ... and classification methods for malware analysis based on their behavior .... identified attack patterns and classified malicious applica- tions.", "title": "[PDF] Andro-profiler: Detecting and Classifying Android Malware based on ...", https://arxiv.org/pdf/1606.01403 },

{ "abstract": "15 Nov 2018 ... convolutional neuRal networks (CNN)-based AndroiD malware. Detection .... Machine learning is a technique that enables the machine to learn the pattern ... malware attacks are still "exploit attack" and "privileged escalation".", "title": "[PDF] ColoR-inspired Convolutional NeuRal Network (CNN) - arXiv", https://arxiv.org/pdf/1705.04448 },

{ "abstract": "Keywords: Ransomware, Malware detection, Machine learning, Network traffic, Intrusion ... in the number of daily ransomware attacks [2] and the cost of the average ... learning for network traffic analysis of Android malware has achieved.", "title": "[PDF] Leveraging Machine Learning Techniques for Windows ... - arXiv", https://arxiv.org/pdf/1807.10440 },

{ "abstract": "8 Apr 2016 ... This attracts malware attacks such as leakage of sensitive information and sending SMS ... All of these techniques perform analysis based on ...", "title": "[PDF] Dexteroid: Detecting Malicious Behaviors in Android Apps Using ...", https://arxiv.org/pdf/1506.05217 },

{ "abstract": "30 Jan 2018 ... Several recent works have proposed methods for attacking mal- ware machine .... Grosse et al. attack a deep learning Android malware model.", "title": "[PDF] Learning to Evade Static PE Machine Learning Malware ... - arXiv", https://arxiv.org/pdf/1801.08917 },

{ "abstract": "redistributed as malware and to improve the health of the overall. Android .... Android obfuscation techniques are applied to different compo- nents of an ...... obfuscation-related attacks to their apps while assuming a greater threat-level for the ...", "title": "[PDF] A Large Scale Investigation of Obfuscation Use in Google Play - arXiv", https://arxiv.org/pdf/1801.02742 },

{ "abstract": "13 Jul 2018 ... A Family of Droids – Android Malware Detection via Behavioral. Modeling: Static ... of techniques to detect and block Android malware based on either static or ...... ing android anti-malware against transformation attacks. IEEE.", "title": "[PDF] arXiv:1803.03448v3 [cs.CR] 13 Jul 2018", https://arxiv.org/pdf/1803.03448 },

{ "abstract": "23 Feb 2018 ... The traditional approach i.e. signature based techniques, to detect the ... malware threat/attack by analysing the opcode occurrence in the apps.", "title": "[PDF] An investigation of the classifiers to detect android malicious apps", https://arxiv.org/pdf/1802.08611 },

{ "abstract": "number of Android malware, with 4,900 malware samples ... these techniques is that they require a trained security analyst ...... cation to attack polymorphism.", "title": "[PDF] Automated Synthesis of Semantic Malware Signatures using ... - arXiv", https://arxiv.org/pdf/1608.06254 },

{ "abstract": "11 Apr 2017 ... widely describe Android malware and detection techniques, and a recent work .... complexity of the attack required to exploit the vulnerabilities.", "title": "[PDF] An Empirical Study on Android-related Vulnerabilities - arXiv", https://arxiv.org/pdf/1704.03356 },

{ "abstract": "Keywords: Phishing, Security, Malware, Social engineering, Spam, Visual similarity, ..... new android families were found, and about 80% of the malware attacks.", "title": "[PDF] Defending against Phishing Attacks: Taxonomy of Methods, Current ...", https://arxiv.org/pdf/1705.09819 },

{ "abstract": "19 Mar 2018 ... Attacks against machine learning systems represent a growing threat as .... more, transferability hinders defense strategies as it ren- ders secrecy ..... system, an Android malware detector, a Twitter-based exploit predictor, and ...", "title": "[PDF] When Does Machine Learning FAIL? Generalized ... - arXiv", https://arxiv.org/pdf/1803.06975 },

{ "abstract": "17 May 2016 ... attacks using orthogonal and complementary methods which may not ... such as Android, Linux and OS X. Antivirus vendor G-DATA reported ...", "title": "[PDF] SPAM: Signal Processing for Analyzing Malware - Semantic Scholar", https://arxiv.org/pdf/1605.05280 },

{ "abstract": "21 Jun 2016 ... and apply existing graph mining and classification techniques. [8]. Some methods ... AppContext [2], a well-known Android malware detection approach represents ... ness, attacks that span across multiple PRG nodes could.", "title": "[PDF] Contextual Weisfeiler-Lehman Graph Kernel For Malware ... - arXiv", https://arxiv.org/pdf/1606.06369 },

{ "abstract": "24 Mar 2018 ... we provide a survey of recent attack and defense techniques for ... Such malicious actions include the opening .... on Android devices.", "title": "[PDF] An Overview of Vulnerabilities of Voice Controlled Systems", https://arxiv.org/pdf/1803.09156 },

{ "abstract": "25 Dec 2017 ... Keywords: Mobile, Android, Malware, IoT, Deep Learning. 1. Introduction. Mobile apps ... The type of attack could be crucial to prevent the ... quence of the Android app methods by a sequence of vec- tors. Afterward, we feed ...", "title": "[PDF] Android Malware Detection using Deep Learning on API Method ...", https://arxiv.org/pdf/1712.08996 },

{ "abstract": "27 Oct 2017 ... defense techniques proposed to mitigate such threat, including re-training on ... attacks have been reported also against Android and PDF.", "title": "[PDF] Adversarial Detection of Flash Malware: Limitations and ... - arXiv", https://arxiv.org/pdf/1710.10225 },

{ "abstract": "27 May 2016 ... Malware Android has been the target for malware from the very .... KNOX is a delicate combination of technologies, consisting of multiple ... some critical vulnerabilities in KNOX and presented practical attacks exploiting them.", "title": "[PDF] Secure Containers in Android: the Samsung KNOX Case Study", https://arxiv.org/pdf/1605.08567 },

{ "abstract": "7 Mar 2017 ... This treatment exposes them to the attack from malicious apps, particularly those ... In this work, we present a new technique to control the com- munication ... design over both Android and iOS (> 95% of mobile OS market.", "title": "[PDF] Guardian of the HAN: Thwarting Mobile Attacks on Smart ... - arXiv", https://arxiv.org/pdf/1703.01537 },

{ "abstract": "14 Apr 2017 ... of Android operating system, its energy usage and how fast battery .... malicious user X. By carrying out an energy attack on the device, the owner ..... Delivering the exploit to the device Several techniques can be used to ...", "title": "[PDF] Energy Attacks on Mobile Devices", https://arxiv.org/pdf/1704.04464 },

{ "abstract": "3 Aug 2018 ... increase in the number and variety of cyber attacks and malware ... tors of cyber attacks, extracting information about the attack methods, and .... to the calculation of CVSS scores (to be used for Android and iOS applica- tions).", "title": "[PDF] Cyber Threat Intelligence: Challenges and Opportunities", https://arxiv.org/pdf/1808.01162 },

{ "abstract": "18 Sep 2018 ... at most defend three of the four attacks, and that HashTran-DNN can effectively defend ... Standard DNNs for Android malware classification can be ruined by ... quantization strategies, but cannot deal with binary features.", "title": "[PDF] HashTran-DNN: A Framework for Enhancing Robustness of ... - arXiv", https://arxiv.org/pdf/1809.06498 },

{ "abstract": "explosively and continuously growing number of malicious ... method outperforms the traditional clustering methods and ... More severely, the attack can easily.", "title": "[PDF] Discovering Communities of Malapps on Android-based ... - arXiv", https://arxiv.org/pdf/1804.01641 },

{ "abstract": "phisticated Eurograbber attack showed that mobile malware may be a very lucrative ... for Android malware detection techniques to successfully analyze mobile ...", "title": "[PDF] Enter Sandbox: Android Sandbox Comparison - SBA Research", https://arxiv.org/pdf/1410.7749 },

{ "abstract": "17 Jul 2017 ... current attack techniques used to convey PDF malware, and discuss state-of-the-art PDF malware analysis tools that ... Malware embedding in PDF files can be largely au- ...... ments and Flash applications, Android malware.", "title": "[PDF] Digital Investigation of PDF Files: Unveiling Traces of ... - arXiv", https://arxiv.org/pdf/1707.05102 },

{ "abstract": "detection where traditional methods fail. ... For example, the Droid Dream attack [2] distributed ... Android, malware developers still manage to run their code in.", "title": "[PDF] Trusted Detection of Kernel Rootkits in Android Devices via ... - arXiv", https://arxiv.org/pdf/1512.04116 },

{ "abstract": "24 Jun 2018 ... fiers, using the proposed attack, without access to the malware .... A white-box evasion technique for an Android static analysis malware clas-.", "title": "[PDF] arXiv:1707.05970v5 [cs.CR] 24 Jun 2018", https://arxiv.org/pdf/1707.05970 },

{ "abstract": "18 Jul 2014 ... Attack utilizes an Android system built-in voice assistant module .... through current mainstream Android malware analysis techniques. From the ...", "title": "[PDF] Your Voice Assistant is Mine: How to Abuse Speakers to Steal ...", https://arxiv.org/pdf/1407.4923 } ]