Skip to main content

Research Repository

Advanced Search

MaMaDroid: Detecting Android malware by building Markov chains of behavioral models (extended version) (2019)
Journal Article
Onwuzurike, L., Mariconti, E., Andriotis, P., De Cristofaro, E., Ross, G., & Stringhini, G. (2019). MaMaDroid: Detecting Android malware by building Markov chains of behavioral models (extended version). ACM Transactions on Privacy and Security, 22(2), https://doi.org/10.1145/3313391

As Android has become increasingly popular, so has malware targeting it, thus motivating the research community to propose different detection techniques. However, the constant evolution of the Android ecosystem, and of malware itself, makes it hard... Read More about MaMaDroid: Detecting Android malware by building Markov chains of behavioral models (extended version).

Distributed consensus algorithm for events detection in cyber-physical systems (2019)
Journal Article
Li, S., Zhao, S., Yang, P., Andriotis, P., Xu, L., & Sun, Q. (2019). Distributed consensus algorithm for events detection in cyber-physical systems. IEEE Internet of Things, 6(2), 2299-2308. https://doi.org/10.1109/JIOT.2019.2906157

In the harsh environmental conditions of cyber-physical systems (CPSs), the consensus problem seems to be one of the central topics that affect the performance of consensus-based applications, such as events detection, estimation, tracking, blockchai... Read More about Distributed consensus algorithm for events detection in cyber-physical systems.

Studying users’ adaptation to Android's run-time fine-grained access control system (2018)
Journal Article
Andriotis, P., Stringhini, G., & Sasse, A. (2018). Studying users’ adaptation to Android's run-time fine-grained access control system. Journal of Information Security and Applications, 40, 31-43. https://doi.org/10.1016/j.jisa.2018.02.004

© 2018 Elsevier Ltd The advent of the sixth Android version brought a significant security and privacy advancement to its users. The platform's security model has changed dramatically, allowing users to grant or deny access to resources when requeste... Read More about Studying users’ adaptation to Android's run-time fine-grained access control system.

Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network (2016)
Journal Article
Li, S., Tryfonas, T., Russell, G., & Andriotis, P. (2016). Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network. IEEE Transactions on Cybernetics, 46(8), 1749-1759. https://doi.org/10.1109/TCYB.2016.2537649

© 2015 IEEE. Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the overall security of a mobile system, it is important to assess... Read More about Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.

A study on usability and security features of the Android pattern lock screen (2016)
Journal Article
Andriotis, P., Oikonomou, G., Mylonas, A., & Tryfonas, T. (2016). A study on usability and security features of the Android pattern lock screen. Information and Computer Security, 24(1), 53-72. https://doi.org/10.1108/ICS-01-2015-0001

© Emerald Group Publishing Limited. Purpose: - The Android pattern lock screen (or graphical password) is a popular user authentication method that relies on the advantages provided by the visual representation of a password, which enhance its memora... Read More about A study on usability and security features of the Android pattern lock screen.

Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations (2015)
Journal Article
Andriotis, P., Oikonomou, G., Tryfonas, T., & Li, S. (2016). Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations. IEEE Transactions on Cybernetics, 46(9), 1974-1985. https://doi.org/10.1109/TCYB.2015.2454733

© 2013 IEEE. Social media networks are becoming increasingly popular because they can satisfy diverse needs of individuals (both personal and professional). Modern mobile devices are empowered with increased capabilities, taking advantage of the tech... Read More about Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations.

An extensible platform for the forensic analysis of social media data (2015)
Journal Article
Read, H., Xynos, K., Sutherland, I., Roarson, F., Andriotis, P., & Oikonomou, G. (2015). An extensible platform for the forensic analysis of social media data. Lecture Notes in Artificial Intelligence, 9190, 404-414. https://doi.org/10.1007/978-3-319-20376-8_36

Visualising data is an important part of the forensic analysis process. Many cell phone forensic tools have specialised visualisation components, but are as of yet able to tackle questions concerning the broad spectrum of social media communication s... Read More about An extensible platform for the forensic analysis of social media data.

Real-time monitoring of privacy abuses and intrusion detection in android system (2015)
Journal Article
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. Lecture Notes in Artificial Intelligence, 9190, 379-390. https://doi.org/10.1007/978-3-319-20376-8_34

In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from ’normal’ apps. We also investigated the injection technolog... Read More about Real-time monitoring of privacy abuses and intrusion detection in android system.

On the development of automated forensic analysis methods for mobile devices (2014)
Journal Article
Andriotis, P., Tryfonas, T., Oikonomou, G., Li, S., Tzermias, Z., Xynos, K., …Prevelakis, V. (2014). On the development of automated forensic analysis methods for mobile devices. Lecture Notes in Artificial Intelligence, 8564, 212-213. https://doi.org/10.1007/978-3-319-08593-7_17

We live in a connected world where mobile devices are used by humans as valuable tools. The use of mobile devices leaves traces that can be treasured assets for a forensic analyst. Our aim is to investigate methods and exercise techniques that will m... Read More about On the development of automated forensic analysis methods for mobile devices.

Multilevel visualization using enhanced social network analysis with smartphone data (2013)
Journal Article
Andriotis, P., Tzermias, Z., Mparmpaki, A., Ioannidis, S., & Oikonomou, G. (2013). Multilevel visualization using enhanced social network analysis with smartphone data. International Journal of Digital Crime and Forensics, 5(4), 34-54. https://doi.org/10.4018/ijdcf.2013100103

While technology matures and becomes more productive, mobile devices can be affordable and, consequently, fully integrated in peopleàs lives. After their unexpected bloom and acceptance, Online Social Networks are now sources of valuable information.... Read More about Multilevel visualization using enhanced social network analysis with smartphone data.

JPEG steganography detection with Benford's Law (2013)
Journal Article
Andriotis, P., Oikonomou, G., & Tryfonas, T. (2013). JPEG steganography detection with Benford's Law. Digital Investigation, 9(3-4), 246-257. https://doi.org/10.1016/j.diin.2013.01.005

In this paper we present a novel approach to the problem of steganography detection in JPEG images by applying a statistical attack. The method is based on the empirical Benford's Law and, more specifically, on its generalized form. We prove and exte... Read More about JPEG steganography detection with Benford's Law.