A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
AndroTotal
2013
Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices - SPSM '13
Although there are controversial opinions regarding how large the mobile malware phenomenon is in terms of absolute numbers, hype aside, the amount of new Android malware variants is increasing. ...
We present AndroTotal, a publicly available tool, malware repository and research framework that aims at mitigating the above challenges, and allow researchers to automatically scan Android apps against ...
This of course creates a market for security products on the Android platform. ...
doi:10.1145/2516760.2516768
dblp:conf/ccs/MaggiVZ13
fatcat:3aiuw24pf5frxlvcdf2itqefjq
AndRadar: Fast Discovery of Android Applications in Alternative Markets
[chapter]
2014
Lecture Notes in Computer Science
This complicates the task of detecting and tracking Android malware. ...
Other mobile platforms, such as Apple iOS and BlackBerry OS also use the marketplace model, but what is unique to Android is the existence of a plethora of alternative application markets. ...
[29] conducted a large-scale measurement on 194 alternative Android markets (of which a list was not disclosed, to the best of our knowledge) in October 2011, collecting 41,057 applications. ...
doi:10.1007/978-3-319-08509-8_4
fatcat:54uaf3s7wjdsblj5yatvi4mzke
A Survey of App Store Analysis for Software Engineering
2017
IEEE Transactions on Software Engineering
Findings from App Store Analysis have a direct and actionable impact on the software teams that develop software for app stores, and have led to techniques for requirements engineering, release planning ...
App stores provide a wealth of information derived from users that would not exist had the applications been distributed via previous software deployment methods. ...
ACKNOWLEDGMENTS We thank the anonymous reviewers for their very helpful feedback, and our many colleagues who responded with their valuable comments on an earlier version of this survey. ...
doi:10.1109/tse.2016.2630689
fatcat:tuqtkqnzordklgq2thihhc6sxy
The Role of Cloud Services in Malicious Software: Trends and Insights
[chapter]
2015
Lecture Notes in Computer Science
We conduct a large scale analysis of all the malware samples submitted to the Anubis malware analysis system between 2008 and 2014. ...
Our results reveal that cybercriminals sustain long-lived operations through the use of public cloud resources, either as a redundant or a major component of their malware infrastructures. ...
This research was partly funded by the French Ministry of education and research under Cifre grant given to Xiao Han, and by the European Unions Horizon 2020 project SUPERCLOUD under grant agreement 643964 ...
doi:10.1007/978-3-319-20550-2_10
fatcat:ac2x23ccavfdfmyikl4pfgcwqq
Usage of Artificial Intelligence to Improve Secure Software Development
2021
Journal of International Scientific Researches
C# is an object-oriented software language that was developed by Microsoft and runs on the .NET framework. It has the ninth in Github, and it would cause a great impact in .NET. ...
As part of a limited literature review study, we have analyzed 3 main articles in detail. ...
large scale study (Lindorfer, 2014) , unless they are complemented by some form of dynamic analysis, as recently proposed in StaDynA (Zhauniarovich, 2015) . ...
doi:10.23834/isrjournal.824662
fatcat:dcohk43h2rd7jg5olkzbmko7ku
Dissecting Android Cryptocurrency Miners
[article]
2019
arXiv
pre-print
In this work, we make a step towards combating this threat. We collected and manually verified a large dataset of Android mining apps. ...
We analyzed the collected miners and identified how they work, what are the most popular libraries and APIs used to facilitate their development, and what static features are typical for this class of ...
There exist a large body of work that focuses on Android malware detection, e.g., [19, 2, 14, 42, 39, 41, 45, 36] , to name just a few. ...
arXiv:1905.02602v2
fatcat:u2jj2sq35vaqdhevqbu5bxlgoe
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
[article]
2018
arXiv
pre-print
We also discuss possible countermeasures, challenges and possible directions for future research on mobile traffic analysis and other emerging domains (e.g., Internet of Things). ...
(iii) the targeted mobile platforms. ...
[62] ACKNOWLEDGMENT Mauro Conti is supported by a Marie Curie Fellowship funded by the European Commission (agreement PCIG11-GA-2012-321980). This work is partially supported by the EU Tag ...
arXiv:1708.03766v3
fatcat:ss6hqa7zsjcavkkwexftpowtku
A Large-Scale Analysis of the Security of Embedded Firmwares
2014
USENIX Security Symposium
In this paper we present the first public, large-scale analysis of firmware images. ...
We leverage this large-scale analysis to bring new insights on the security of embedded devices and to underline and detail several important challenges that need to be addressed in future research. ...
In particular we thank our shepherd, Cynthia Sturton, for her valuable time and inputs guiding this paper for publication. ...
dblp:conf/uss/CostinZFB14
fatcat:2hmiegyeibab7j2kaq5wlm4shy
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild
2017
2017 IEEE Symposium on Security and Privacy (SP)
To our knowledge, we are the first large-scale systematic study of RAT use. ...
In this work we study the use of DarkComet, a popular commercial RAT. ...
We developed a technique to scan for DarkComet operators active on the Internet. ...
doi:10.1109/sp.2017.48
dblp:conf/sp/FarinholtRPDYBM17
fatcat:gfztgkoejzbshi3xlbxom324oi
2021 Index IEEE Transactions on Big Data Vol. 7
2022
IEEE Transactions on Big Data
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination. ...
The Subject Index contains entries describing the item under all appropriate subject headings, plus the first author's name, the publication abbreviation, month, and year, and inclusive pages. ...
., +, TBData Oct. 2021 796-807 Computer crime A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform. ...
doi:10.1109/tbdata.2021.3137062
fatcat:czv5veuqtjex7alnqcuyjoxbma
On the Security of Application Installers and Online Software Repositories
[chapter]
2020
Lecture Notes in Computer Science
Online public repositories have been one of the most popular ways for end users to obtain software, but there is a lack of systematic security evaluation of popular public repositories. ...
We focus on their software updating dynamics, as well as the presence of traces of vulnerable and/or trojanized applications among the top-100 most downloaded Windows programs on each of the evaluated ...
The closest work to ours are related to the investigation of the application installation logs on the Android platform [23] and the detection of piracy signs on application installers [21] . ...
doi:10.1007/978-3-030-52683-2_10
fatcat:cwz4ck5aozaipkbz6hmdqhoxh4
Anatomy of Threats to The Internet of Things
2018
IEEE Communications Surveys and Tutorials
We present a detailed attack methodology adopted by some of the most successful malware attacks on IoT including ICS and CPS. ...
In the end, we propose a composite guideline for the development of an IoT security framework based on industry best practices and also highlight lessons learned, pitfalls and the open research challenges ...
A. Anatomy of Malware Different types of malware are developed to achieve diverse objectives. ...
doi:10.1109/comst.2018.2874978
fatcat:5qkflaozurb4nctkfrwswnbce4
A Survey on Honeypot Software and Data Analysis
[article]
2016
arXiv
pre-print
In this survey, we give an extensive overview on honeypots. This includes not only honeypot software but also methodologies to analyse honeypot data. ...
They use a deviation value β to detect large-scale and unusual events. β > 10 indicates botnet-waves and fast-scanning worms, β > 3 slow-scanning worms. β pi = mp i / i−1 j=0 p j (36) where p i denotes ...
One of the very first large-scale worldwide honeypot projects was launched by the Institut Eurocom in 2003 and is called the Leurre.com project. ...
arXiv:1608.06249v1
fatcat:nlv2qdnmmvhxlmsfkyszl3owxq
A Survey on Botnets: Incentives, Evolution, Detection and Current Trends
2021
Future Internet
Botnets have shown a capacity to perform substantial damage through distributed denial-of-service attacks, information theft, spam and malware propagation. ...
In this paper, a systematic literature review on botnets is presented to the reader in order to obtain an understanding of the incentives, evolution, detection, mitigation and current trends within the ...
However, both papers do not include more recent studies and publications (all are pre-2014). ...
doi:10.3390/fi13080198
fatcat:5umqenw47ncdxggi4kiotkeag4
Evil Offspring - Ransomware and Crypto Technology
2016
IEEE Internet Computing
This column
focuses on one such phenomenon,
which goes by the label "congestion." ...
The malware on a victim's computer will encrypt the symmetric key using the public key. The public key itself serves as the identifier to use when paying the ransom. ...
Sidney Fernbach, one of the pioneers on the development and application of high performance computers for the solution of large computational problems. ...
doi:10.1109/mic.2016.90
fatcat:v5zmzx7qrba5dkqxweoo3ifvry
« Previous
Showing results 1 — 15 out of 80 results