Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (29)
  • Open Access

    ARTICLE

    The Trade-Off Between Performance and Security of Virtualized Trusted Execution Environment on Android

    Thien-Phuc Doan, Ngoc-Tu Chau, Jungsoo Park, Souhwan Jung*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3059-3073, 2023, DOI:10.32604/csse.2023.038664

    Abstract Nowadays, with the significant growth of the mobile market, security issues on the Android Operation System have also become an urgent matter. Trusted execution environment (TEE) technologies are considered an option for satisfying the inviolable property by taking advantage of hardware security. However, for Android, TEE technologies still contain restrictions and limitations. The first issue is that non-original equipment manufacturer developers have limited access to the functionality of hardware-based TEE. Another issue of hardware-based TEE is the cross-platform problem. Since every mobile device supports different TEE vendors, it becomes an obstacle for developers to migrate their trusted applications to other… More >

  • Open Access

    ARTICLE

    Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification

    Younghoon Ban, Jeong Hyun Yi, Haehyun Cho*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2215-2230, 2023, DOI:10.32604/csse.2023.036555

    Abstract Android malware has evolved in various forms such as adware that continuously exposes advertisements, banking malware designed to access users’ online banking accounts, and Short Message Service (SMS) malware that uses a Command & Control (C&C) server to send malicious SMS, intercept SMS, and steal data. By using many malicious strategies, the number of malware is steadily increasing. Increasing Android malware threats numerous users, and thus, it is necessary to detect malware quickly and accurately. Each malware has distinguishable characteristics based on its actions. Therefore, security researchers have tried to categorize malware based on their behaviors by conducting the familial… More >

  • Open Access

    ARTICLE

    Applying Wide & Deep Learning Model for Android Malware Classification

    Le Duc Thuan1,2,*, Pham Van Huong2, Hoang Van Hiep1, Nguyen Kim Khanh1

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2741-2759, 2023, DOI:10.32604/csse.2023.033420

    Abstract Android malware has exploded in popularity in recent years, due to the platform’s dominance of the mobile market. With the advancement of deep learning technology, numerous deep learning-based works have been proposed for the classification of Android malware. Deep learning technology is designed to handle a large amount of raw and continuous data, such as image content data. However, it is incompatible with discrete features, i.e., features gathered from multiple sources. Furthermore, if the feature set is already well-extracted and sparsely distributed, this technology is less effective than traditional machine learning. On the other hand, a wide learning model can… More >

  • Open Access

    ARTICLE

    Android IoT Lifelog System and Its Application to Motion Inference

    Munkhtsetseg1, Jeongwook Seo2,*

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2989-3003, 2023, DOI:10.32604/csse.2023.033342

    Abstract In social science, health care, digital therapeutics, etc., smartphone data have played important roles to infer users’ daily lives. However, smartphone data collection systems could not be used effectively and widely because they did not exploit any Internet of Things (IoT) standards (e.g., oneM2M) and class labeling methods for machine learning (ML) services. Therefore, in this paper, we propose a novel Android IoT lifelog system complying with oneM2M standards to collect various lifelog data in smartphones and provide two manual and automated class labeling methods for inference of users’ daily lives. The proposed system consists of an Android IoT client… More >

  • Open Access

    ARTICLE

    Malware Detection in Android IoT Systems Using Deep Learning

    Muhammad Waqar1, Sabeeh Fareed1, Ajung Kim2,*, Saif Ur Rehman Malik3, Muhammad Imran1, Muhammad Usman Yaseen1

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4399-4415, 2023, DOI:10.32604/cmc.2023.032984

    Abstract The Android Operating System (AOS) has been evolving since its inception and it has become one of the most widely used operating system for the Internet of Things (IoT). Due to the high popularity and reliability of AOS for IoT, it is a target of many cyber-attacks which can cause compromise of privacy, financial loss, data integrity, unauthorized access, denial of services and so on. The Android-based IoT (AIoT) devices are extremely vulnerable to various malwares due to the open nature and high acceptance of Android in the market. Recently, several detection preventive malwares are developed to conceal their malicious… More >

  • Open Access

    ARTICLE

    Android Malware Detection Using ResNet-50 Stacking

    Lojain Nahhas1, Marwan Albahar1,*, Abdullah Alammari2, Anca Jurcut3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3997-4014, 2023, DOI:10.32604/cmc.2023.028316

    Abstract There has been an increase in attacks on mobile devices, such as smartphones and tablets, due to their growing popularity. Mobile malware is one of the most dangerous threats, causing both security breaches and financial losses. Mobile malware is likely to continue to evolve and proliferate to carry out a variety of cybercrimes on mobile devices. Mobile malware specifically targets Android operating system as it has grown in popularity. The rapid proliferation of Android malware apps poses a significant security risk to users, making static and manual analysis of malicious files difficult. Therefore, efficient identification and classification of Android malicious… More >

  • Open Access

    ARTICLE

    Investigation of Android Malware with Machine Learning Classifiers using Enhanced PCA Algorithm

    V. Joseph Raymond1,2,*, R. Jeberson Retna Raj1

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2147-2163, 2023, DOI:10.32604/csse.2023.028227

    Abstract Android devices are popularly available in the commercial market at different price levels for various levels of customers. The Android stack is more vulnerable compared to other platforms because of its open-source nature. There are many android malware detection techniques available to exploit the source code and find associated components during execution time. To obtain a better result we create a hybrid technique merging static and dynamic processes. In this paper, in the first part, we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid Multicollinearity problem is one of… More >

  • Open Access

    ARTICLE

    Swarm Optimization and Machine Learning for Android Malware Detection

    K. Santosh Jhansi1,2,*, P. Ravi Kiran Varma2, Sujata Chakravarty3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6327-6345, 2022, DOI:10.32604/cmc.2022.030878

    Abstract Malware Security Intelligence constitutes the analysis of applications and their associated metadata for possible security threats. Application Programming Interfaces (API) calls contain valuable information that can help with malware identification. The malware analysis with reduced feature space helps for the efficient identification of malware. The goal of this research is to find the most informative features of API calls to improve the android malware detection accuracy. Three swarm optimization methods, viz., Ant Lion Optimization (ALO), Cuckoo Search Optimization (CSO), and Firefly Optimization (FO) are applied to API calls using auto-encoders for identification of most influential features. The nature-inspired wrapper-based algorithms… More >

  • Open Access

    ARTICLE

    Investigation of Android Malware Using Deep Learning Approach

    V. Joseph Raymond1,2,*, R. Jeberson Retna Raj1

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2413-2429, 2023, DOI:10.32604/iasc.2023.030527

    Abstract In recent days the usage of android smartphones has increased extensively by end-users. There are several applications in different categories banking/finance, social engineering, education, sports and fitness, and many more applications. The android stack is more vulnerable compared to other mobile platforms like IOS, Windows, or Blackberry because of the open-source platform. In the Existing system, malware is written using vulnerable system calls to bypass signature detection important drawback is might not work with zero-day exploits and stealth malware. The attackers target the victim with various attacks like adware, backdoor, spyware, ransomware, and zero-day exploits and create threat hunts on… More >

  • Open Access

    ARTICLE

    Optimal Unification of Static and Dynamic Features for Smartphone Security Analysis

    Sumit Kumar1,*, S. Indu2, Gurjit Singh Walia1

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1035-1051, 2023, DOI:10.32604/iasc.2023.024469

    Abstract Android Smartphones are proliferating extensively in the digital world due to their widespread applications in a myriad of fields. The increased popularity of the android platform entices malware developers to design malicious apps to achieve their malevolent intents. Also, static analysis approaches fail to detect run-time behaviors of malicious apps. To address these issues, an optimal unification of static and dynamic features for smartphone security analysis is proposed. The proposed solution exploits both static and dynamic features for generating a highly distinct unified feature vector using graph based cross-diffusion strategy. Further, a unified feature is subjected to the fuzzy-based classification… More >

Displaying 1-10 on page 1 of 29. Per Page  

Share Link