4

Dissecting Android Cryptocurrency Miners

Cryptojacking applications pose a serious threat to mobile devices. Due to the extensive computations, they deplete the battery fast and can even …

Sorting the Garbage: Filtering Out DRDoS Amplification Traffic in ISP Networks

Distributed Reflected Denial of Service (DRDoS) attacks have been continuing to grow unprecedentedly in the recent years. Attackers abuse genuine …

Profiling DRDoS Attacks with Data Analytics Pipeline
A large amount of Distributed Reflective Denial-of-Service (DRDoS) attacks are launched every day, and our understanding of the modus operandi of …
Please Hold On: Unobtrusive User Authentication Using Smartphone's Built-in Sensors
Smartphones provide anytime-anywhere communications and are being increasingly used for a variety of purposes, e.g, sending email, performing online …
Visualization of Actionable Knowledge to Mitigate DRDoS Attacks
Distributed Reflective Denial of Service attacks (DRDoS) represent an ever growing security threat. These attacks are characterized by spoofed UDP …
Evaluation of Resource-based App Repackaging Detection in Android

Android app repackaging threatens the health of application markets, as repackaged apps, besides stealing revenue for honest developers, are also a …

Small Changes, Big Changes: An Updated View on the Android Permission System
Since the appearance of Android, its permission system was central to many studies of Android security. For a long time, the description of the …
Towards Black Box Testing of Android Apps
Many state-of-art mobile application testing frameworks (e.g., Dynodroid, EvoDroid) enjoy Emma or other code coverage libraries to measure the …
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications
Static analysis of Android applications can be hindered by the presence of the popular dynamic code update techniques: dynamic class loading and …
FSquaDRA: Fast Detection of Repackaged Applications

The ease of Android applications repackaging and proliferation of application clones in Google Play and other markets call for new effective …