Detecting Colluding Inter-App Communication in Mobile Environment

[1]  Abdullahi Arabo,et al.  Detecting Ransomware Using Process Behavior Analysis , 2020 .

[2]  Aniello Cimitile,et al.  Evaluating model checking for cyber threats code obfuscation identification , 2018, J. Parallel Distributed Comput..

[3]  Mordechai Guri,et al.  MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields , 2018, Future Gener. Comput. Syst..

[4]  Eric Medvet,et al.  Visualizing the outcome of dynamic analysis of Android malware with VizMal , 2020, J. Inf. Secur. Appl..

[5]  Manoj Singh Gaur,et al.  EspyDroid+: Precise reflection analysis of android apps , 2020, Comput. Secur..

[6]  Donghai Tian,et al.  MSYM: A multichannel communication system for android devices , 2020, Comput. Networks.

[7]  Rosdiadee Nordin,et al.  A New Sensors-Based Covert Channel on Android , 2014, TheScientificWorldJournal.

[8]  Hamid Sharif,et al.  A Support Vector Machine-Based Framework for Detection of Covert Timing Channels , 2016, IEEE Transactions on Dependable and Secure Computing.

[9]  Antonella Santone,et al.  Model checking for malicious family detection and phylogenetic analysis in mobile environment , 2020, Comput. Secur..

[10]  Atif M. Memon,et al.  Colluding Apps: Tomorrow's Mobile Malware Threat , 2015, IEEE Security & Privacy.

[11]  Byung-Gon Chun,et al.  TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.

[12]  Gerardo Canfora,et al.  LEILA: Formal Tool for Identifying Mobile Malicious Behaviour , 2019, IEEE Transactions on Software Engineering.

[13]  Ke Xu,et al.  ICCDetector: ICC-Based Malware Detection on Android , 2016, IEEE Transactions on Information Forensics and Security.

[14]  Antonella Santone,et al.  Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences , 2020, Inf..

[15]  Aniello Cimitile,et al.  Talos: no more ransomware victims with formal methods , 2018, International Journal of Information Security.

[16]  Sankardas Roy,et al.  Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps , 2014, CCS.

[17]  Cheng Huang,et al.  Covert timing channel detection method based on time interval and payload length analysis , 2020, Comput. Secur..

[18]  Sanaa Ghouzali,et al.  Android data storage security: A review , 2020, J. King Saud Univ. Comput. Inf. Sci..

[19]  Antonella Santone,et al.  Heuristic search for equivalence checking , 2014, Software & Systems Modeling.

[20]  Thomas M. Chen,et al.  Automated generation of colluding apps for experimental research , 2017, Journal of Computer Virology and Hacking Techniques.