Unity is the most popular cross-platform development framework to develop games for multiple platforms such as Android, iOS, and Windows Mobile. While Unity developers can easily develop mobile apps for multiple platforms, adversaries can also easily build malicious apps based on the “write once, run anywhere” (WORA) feature. Even though malicious apps were discovered among Android apps written with Unity framework (Unity apps), little research has been done on analysing the malicious apps. We propose static and dynamic reverse engineering techniques for malicious Unity apps. We first inspect the executable file format of a Unity app and present an effective static analysis technique of the Unity app. Then, we also propose a systematic tech...
Abstract—The design of the Android system allows applica-tions to load additional code from external...
Mobile devices are prevalent in everyday society and the installation of third-party applications pr...
Abstract—Smart mobile devices have been widely used and the contained sensitive information is endan...
Similar to the PC world, the abundance of mobile malware has become a serious threat to smartphone u...
The increasing number of repeated malware penetrations into official mobile app markets poses a high...
A paper co-authored by William Glisson published in the Proceedings of the 50th Hawaii International...
The identification and analysis of Android malware involves either static or dynamic program analysi...
Recently, the number of available Android apps in Googles Play Store reached 2 million. Usually, And...
This research combines static and behavior analysis to detect malwares on Android system. The analys...
International audienceAn important part of malware analysis is dynamic analysis. Dynamic analysis tr...
Malicious software, as known as malware, has raised an increasing concern over the recent years. Thi...
Context: Static analysis exploits techniques that parse program source code or bytecode, often trave...
First we report on a new threat campaign, underway in Korea, which infected around 20,000 Android us...
Android has dominated the mobile market for a few years now, and continues to increase its market sh...
We report on a new threat campaign, underway in Korea, which infected around 20,000 Android users wi...
Abstract—The design of the Android system allows applica-tions to load additional code from external...
Mobile devices are prevalent in everyday society and the installation of third-party applications pr...
Abstract—Smart mobile devices have been widely used and the contained sensitive information is endan...
Similar to the PC world, the abundance of mobile malware has become a serious threat to smartphone u...
The increasing number of repeated malware penetrations into official mobile app markets poses a high...
A paper co-authored by William Glisson published in the Proceedings of the 50th Hawaii International...
The identification and analysis of Android malware involves either static or dynamic program analysi...
Recently, the number of available Android apps in Googles Play Store reached 2 million. Usually, And...
This research combines static and behavior analysis to detect malwares on Android system. The analys...
International audienceAn important part of malware analysis is dynamic analysis. Dynamic analysis tr...
Malicious software, as known as malware, has raised an increasing concern over the recent years. Thi...
Context: Static analysis exploits techniques that parse program source code or bytecode, often trave...
First we report on a new threat campaign, underway in Korea, which infected around 20,000 Android us...
Android has dominated the mobile market for a few years now, and continues to increase its market sh...
We report on a new threat campaign, underway in Korea, which infected around 20,000 Android users wi...
Abstract—The design of the Android system allows applica-tions to load additional code from external...
Mobile devices are prevalent in everyday society and the installation of third-party applications pr...
Abstract—Smart mobile devices have been widely used and the contained sensitive information is endan...