A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
On the evaluation of android malware detectors against code-obfuscation techniques
2022
PeerJ Computer Science
The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques. The obfuscation techniques are used to hide the malicious code in the Android applications to evade detection by anti-malware tools. Some attackers use the obfuscation techniques in isolation, while some attackers use a mixed approach (i.e., employing multiple
doi:10.7717/peerj-cs.1002
pmid:35875645
pmcid:PMC9299270
fatcat:fqx55jfzabdcnhk5apuzd63r7y