2023
DOI: 10.3390/jcp3030019
|View full text |Cite
|
Sign up to set email alerts
|

VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics

Abstract: The ubiquity of Android smartphones makes them targets of sophisticated malware, which maintain long-term stealth, particularly by offloading attack steps to benign apps. Such malware leaves little to no trace in logs, and the attack steps become difficult to discern from benign app functionality. Endpoint detection and response (EDR) systems provide live forensic capabilities that enable anomaly detection techniques to detect anomalous behavior in application logs after an app hijack. However, this presents a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 57 publications
(83 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?