March 10, 2022, 2:20 a.m. | Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein

cs.CR updates on arXiv.org arxiv.org

Many Android apps analyzers rely, among other techniques, on dynamic analysis
to monitor their runtime behavior and detect potential security threats.
However, malicious developers use subtle, though efficient, techniques to
bypass dynamic analyzers. Logic bombs are examples of popular techniques where
the malicious code is triggered only under specific circumstances, challenging
comprehensive dynamic analyses. The research community has proposed various
approaches and tools to detect logic bombs. Unfortunately, rigorous assessment
and fair comparison of state-of-the-art techniques are impossible due to …

android applications bombs logic

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Intermediate Security Engineer, (Incident Response, Trust & Safety)

@ GitLab | Remote, US

Journeyman Cybersecurity Triage Analyst

@ Peraton | Linthicum, MD, United States

Project Manager II - Compliance

@ Critical Path Institute | Tucson, AZ, USA

Junior System Engineer (m/w/d) Cyber Security 1

@ Deutsche Telekom | Leipzig, Deutschland