all InfoSec news
TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs. (arXiv:2203.04448v1 [cs.CR])
March 10, 2022, 2:20 a.m. | Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein
cs.CR updates on arXiv.org arxiv.org
Many Android apps analyzers rely, among other techniques, on dynamic analysis
to monitor their runtime behavior and detect potential security threats.
However, malicious developers use subtle, though efficient, techniques to
bypass dynamic analyzers. Logic bombs are examples of popular techniques where
the malicious code is triggered only under specific circumstances, challenging
comprehensive dynamic analyses. The research community has proposed various
approaches and tools to detect logic bombs. Unfortunately, rigorous assessment
and fair comparison of state-of-the-art techniques are impossible due to …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Intermediate Security Engineer, (Incident Response, Trust & Safety)
@ GitLab | Remote, US
Journeyman Cybersecurity Triage Analyst
@ Peraton | Linthicum, MD, United States
Project Manager II - Compliance
@ Critical Path Institute | Tucson, AZ, USA
Junior System Engineer (m/w/d) Cyber Security 1
@ Deutsche Telekom | Leipzig, Deutschland