Abstract
Introduction: Mobile devices have become an integral part of our digital lives, facilitating various tasks and storing a treasure trove of sensitive information. However, as more people utilize mobile devices, sophisticated cyber threats are emerging to elude traditional security measures. Method: The use of evasion techniques by malicious actors presents a significant challenge to mobile security, necessitating creative solutions. In this work, we investigate the potential critical role that the aspect-oriented programming paradigm AspectJ can play in strengthening mobile security against evasion attempts. Evasion techniques cover a wide range of tactics, including runtime manipulation, code obfuscation, and unauthorized data access. Results: These tactics usually aim to bypass detection and avoid security measures. In order to address the aforementioned issues, this paper uses AspectJ to give developers a flexible and dynamic way to add aspects to their coding structures so they can monitor, intercept, and respond to evasive actions. It illustrates how AspectJ can improve mobile security and counteract the long-lasting risks that evasion techniques present in a dynamic threat landscape. Conclusion: Consequently, this work proposes a novel defense mechanism incorporating AspectJ into a significant paradigm of security against evasion with 91.33% accuracy and demonstrates the successful detection of evasive attacks.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Recent Advances in Computer Science and Communications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.