Data on Vulnerability Detection in Android
نویسندگان
چکیده
منابع مشابه
Android Tapjacking Vulnerability
Android is an open source mobile operating system that is developed mainly by Google. It is used on a significant portion of mobile devices worldwide. In this paper, I will be looking at an attack commonly known as tapjacking. I will be taking the attack apart and walking through each individual step required to implement the attack. I will then explore the various payload options available to ...
متن کاملObject Detection on the Android
Object detection has been a formidable challenge in computer vision. Although there has been considerable work that demonstrates good results when either the object was observed in training or when there is limited intra-class variability, a universal inter-class, intra-class soltuion remains unseen. The case for further work to re ne and improve object detection is transparent. Object Detectio...
متن کاملApplying Behavioral Detection on Android-Based Devices
We present Andromaly a behavioral-based detection framework for Android-powered mobile devices. The proposed framework realizes a Host-based Intrusion Detection System (HIDS) that continuously monitors various features and events obtained from the mobile device, and then applies Machine Learning methods to classify the collected data as normal (benign) or abnormal (malicious). Since no maliciou...
متن کاملAndroid Malware Detection Based on System Calls
With Android being the most widespread mobile platform, protecting it against malicious applications is essential. Android users typically install applications from large remote repositories, which provides ample opportunities for malicious newcomers. In this paper, we propose a simple, and yet highly effective technique for detecting malicious Android applications on a repository level. Our te...
متن کاملTrends In Android Malware Detection
This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and behavioral patterns. Each paper is reviewe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Data in Brief
سال: 2019
ISSN: 2352-3409
DOI: 10.1016/j.dib.2018.12.038