Brief View and Analysis to Latest Android Security Issues and Approaches
- URL: http://arxiv.org/abs/2109.00805v1
- Date: Thu, 2 Sep 2021 09:34:11 GMT
- Title: Brief View and Analysis to Latest Android Security Issues and Approaches
- Authors: Ruicong Huang
- Abstract summary: We conduct a wide range of analysis, including latest malwares, Android security features, and approaches.
We also provide some finding when we are gathering information and carrying on experiments.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Due to the continuous improvement of performance and functions, Android
remains the most popular operating system on mobile phone today. However,
various malicious applications bring great threats to the system. Over the past
few years, significant changes occured in both malwares and counter measures.
Specifically, malwares are continuously evolving, and advanced approaches are
adopted for more accurate detection. To keep up with the latest situation, in
this paper, we conduct a wide range of analysis, including latest malwares,
Android security features, and approaches. We also provide some finding when we
are gathering information and carrying on experiments, which we think is useful
for further researches and has not been mentioned in previous works.
Related papers
- Characterizing Robocalls with Multiple Vantage Points [50.423738777985314]
We show that unsolicited calls are in slow decline, though complaints and call volumes remain high.
We find that robocallers have managed to adapt to STIR/SHAKEN, a mandatory call authentication scheme.
In total, our findings highlight the most promising directions for future efforts to characterize and stop telephone spam.
arXiv Detail & Related papers (2024-10-22T18:54:12Z) - ActDroid: An active learning framework for Android malware detection [3.195234044113248]
A new piece of malware appears online every 12 seconds.
Online learning can be used to mitigate the problem of labelling applications.
Our framework achieves accuracies of up to 96%.
arXiv Detail & Related papers (2024-01-30T13:10:33Z) - Can you See me? On the Visibility of NOPs against Android Malware Detectors [1.2187048691454239]
This paper proposes a visibility metric that assesses the difficulty in spotting NOPs and similar non-operational codes.
We tested our metric on a state-of-the-art, opcode-based deep learning system for Android malware detection.
arXiv Detail & Related papers (2023-12-28T20:48:16Z) - On building machine learning pipelines for Android malware detection: a
procedural survey of practices, challenges and opportunities [4.8460847676785175]
As the smartphone market leader, Android has been a prominent target for malware attacks.
For market holders and researchers, in particular, the large number of samples has made manual malware detection unfeasible.
While some of the proposed approaches achieve high performance, rapidly evolving Android malware has made them unable to maintain their accuracy over time.
arXiv Detail & Related papers (2023-06-12T13:52:28Z) - Towards a Fair Comparison and Realistic Design and Evaluation Framework
of Android Malware Detectors [63.75363908696257]
We analyze 10 influential research works on Android malware detection using a common evaluation framework.
We identify five factors that, if not taken into account when creating datasets and designing detectors, significantly affect the trained ML models.
We conclude that the studied ML-based detectors have been evaluated optimistically, which justifies the good published results.
arXiv Detail & Related papers (2022-05-25T08:28:08Z) - Analysis of Longitudinal Changes in Privacy Behavior of Android
Applications [79.71330613821037]
In this paper, we examine the trends in how Android apps have changed over time with respect to privacy.
We examine the adoption of HTTPS, whether apps scan the device for other installed apps, the use of permissions for privacy-sensitive data, and the use of unique identifiers.
We find that privacy-related behavior has improved with time as apps continue to receive updates, and that the third-party libraries used by apps are responsible for more issues with privacy.
arXiv Detail & Related papers (2021-12-28T16:21:31Z) - Android Malware Category and Family Detection and Identification using
Machine Learning [0.0]
We present two machine-learning approaches for Dynamic Analysis of Android Malware.
Our approach achieves in Android Malware Category detection more than 96 % accurate and achieves in Android Malware Family detection more than 99% accurate.
arXiv Detail & Related papers (2021-07-05T10:48:40Z) - Inspect, Understand, Overcome: A Survey of Practical Methods for AI
Safety [54.478842696269304]
The use of deep neural networks (DNNs) in safety-critical applications is challenging due to numerous model-inherent shortcomings.
In recent years, a zoo of state-of-the-art techniques aiming to address these safety concerns has emerged.
Our paper addresses both machine learning experts and safety engineers.
arXiv Detail & Related papers (2021-04-29T09:54:54Z) - Early Detection of In-Memory Malicious Activity based on Run-time
Environmental Features [4.213427823201119]
We present a novel end-to-end solution for in-memory malicious activity detection done prior to exploitation.
This solution achieves reduced overhead and false positives as well as deployment simplicity.
arXiv Detail & Related papers (2021-03-30T02:19:00Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.