2022
DOI: 10.7717/peerj-cs.907
|View full text |Cite
|
Sign up to set email alerts
|

The rise of obfuscated Android malware and impacts on detection methods

Abstract: The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. Android malware hackers adopt reverse engineering and repackage benign applications with their malicious code. Therefore, Android applications developers tend to use state-of-the-art obfuscation techniques to mitigate the risk of application plagiarism. The malware authors adopt the obfuscation and transformation techniques to defeat the anti-malware detections, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 181 publications
(334 reference statements)
0
15
0
2
Order By: Relevance
“…[138,139,140]). However, they did not succeed, as proved in this survey and also in other surveys (e.g., [31]…”
Section: Datasetsmentioning
confidence: 42%
See 3 more Smart Citations
“…[138,139,140]). However, they did not succeed, as proved in this survey and also in other surveys (e.g., [31]…”
Section: Datasetsmentioning
confidence: 42%
“…Various surveys were conducted on problem-space evasion attacks, e.g. [22,23,24,25,26,27,28,29,30,31,32,33,34]. However, some of these surveys are general and therefore do not focus on a specific domain of evasion attacks [23,27,28,30,32,33].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Malware authors are always looking for new tricks and mechanisms to bypass Android security. The malware authors adopt different obfuscation and transformation techniques to bypass the anti-malware detection ( Elsersy, Feizollah & Anuar, 2022 ). The main motivation of this work is to evaluate the anti-malware tools against the malware that uses code-obfuscations.…”
Section: Introductionmentioning
confidence: 99%