As Android has become increasingly popular, so has malware targeting it, thus motivating the research community to propose different detection techniques. However, the constant evolution of the Android ecosystem, and of malware itself, makes it hard to design robust tools that can operate for long periods of time without the need for modifications or costly re-training. Aiming to address this issue, we set to detect malware from a behavioral point of view, modeled as the sequence of abstracted API calls. We introduce MaMaDroid, a static-analysis-based system that abstracts app's API calls to their class, package, or family, and builds a model from their sequences obtained from the call graph of an app as Markov chains. This ensures that the...
Ransomware constitutes a significant threat to the Android operating system. It can either lock or e...
The widespread adoption of Android devices and their capability to store access significant private ...
Machine learning classification algorithms are widely applied to different malware analysis problems...
As Android has become increasingly popular, so has malware targeting it, thus motivating the researc...
As Android has become increasingly popular, so has malware targeting it, thus motivating the researc...
The rise in popularity of the Android platform has resulted in an explosion of malware threats targ...
Following the increasing popularity of mobile ecosystems, cybercriminals have increasingly targeted ...
Android offers plenty of services to mobile users and has gained significant popularity worldwide. T...
Today, Android is one of the most used operating systems in smartphone technology. This is the main ...
Android users are constantly threatened by an increasing number of malicious applications (apps), ge...
Mobile malware has recently become an acute problem. Existing solutions either base static reasoning...
In recent years, a widespread research is conducted with the growth of malware resulted in the domai...
Malware threats are growing, while at the same time, concealment strategies are being used to make t...
Google’s Android operating system was first announced to the public in 2007 and was installed on mor...
Just like in traditional desktop computing, one of the major security issues in mobile computing li...
Ransomware constitutes a significant threat to the Android operating system. It can either lock or e...
The widespread adoption of Android devices and their capability to store access significant private ...
Machine learning classification algorithms are widely applied to different malware analysis problems...
As Android has become increasingly popular, so has malware targeting it, thus motivating the researc...
As Android has become increasingly popular, so has malware targeting it, thus motivating the researc...
The rise in popularity of the Android platform has resulted in an explosion of malware threats targ...
Following the increasing popularity of mobile ecosystems, cybercriminals have increasingly targeted ...
Android offers plenty of services to mobile users and has gained significant popularity worldwide. T...
Today, Android is one of the most used operating systems in smartphone technology. This is the main ...
Android users are constantly threatened by an increasing number of malicious applications (apps), ge...
Mobile malware has recently become an acute problem. Existing solutions either base static reasoning...
In recent years, a widespread research is conducted with the growth of malware resulted in the domai...
Malware threats are growing, while at the same time, concealment strategies are being used to make t...
Google’s Android operating system was first announced to the public in 2007 and was installed on mor...
Just like in traditional desktop computing, one of the major security issues in mobile computing li...
Ransomware constitutes a significant threat to the Android operating system. It can either lock or e...
The widespread adoption of Android devices and their capability to store access significant private ...
Machine learning classification algorithms are widely applied to different malware analysis problems...