2024
DOI: 10.1109/access.2023.3321383
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Sensitive Malicious Android Functionalities using Inter-component Control-flow Analysis

Rati Bhan,
Parvez Faruki,
Rajendra Pamula

Abstract: Android Smartphone's popularity among users and developers is due to its open architecture and third-party apps. The exponential growth of third-party developer apps needs a robust code audit before upload. The weak program analysis at app stores adversely affects security. Third-party developers can update the app to introduce malicious activities. Sensitive sensor hardware and software resources are exfiltrated for leaking sensitive user data like messages, contacts, audio, and images. Malicious hidden featu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 59 publications
0
1
0
Order By: Relevance
“…In this case, without using sequence information and relying solely on statistical features of packet lengths, there might be a loss of temporal information. Therefore, packet length sequences are extracted by taking the first 1000 packet lengths in both directions for each client and feeding them into the TextCNN algorithm [7] .…”
Section: Packet Length Distribution Characteristicsmentioning
confidence: 99%
“…In this case, without using sequence information and relying solely on statistical features of packet lengths, there might be a loss of temporal information. Therefore, packet length sequences are extracted by taking the first 1000 packet lengths in both directions for each client and feeding them into the TextCNN algorithm [7] .…”
Section: Packet Length Distribution Characteristicsmentioning
confidence: 99%