no code implementations • 9 Mar 2018 • Lucky Onwuzurike, Mario Almeida, Enrico Mariconti, Jeremy Blackburn, Gianluca Stringhini, Emiliano De Cristofaro
Aiming to counter them, detection techniques based on either static or dynamic analysis that model Android malware, have been proposed.
Cryptography and Security
no code implementations • 20 Nov 2017 • Lucky Onwuzurike, Enrico Mariconti, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, Gianluca Stringhini
Aiming to assess whether MaMaDroid's effectiveness mainly stems from the API abstraction or from the sequencing modeling, we also evaluate a variant of it that uses frequency (instead of sequences), of abstracted API calls.
no code implementations • 13 Dec 2016 • Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, Gianluca Stringhini
Finally, we compare against DroidAPIMiner, a state-of-the-art system that relies on the frequency of API calls performed by apps, showing that MaMaDroid significantly outperforms it.
Cryptography and Security
no code implementations • 4 May 2015 • Lucky Onwuzurike, Emiliano De Cristofaro
This paper presents a measurement study of information leakage and SSL vulnerabilities in popular Android apps.
Cryptography and Security Software Engineering