Parvez Faruki
Parvez Faruki
Head of Department, Information Technology, AVPTI Rajkot
Verified email at mnit.ac.in - Homepage
TitleCited byYear
Android security: a survey of issues, malware penetration, and defenses
P Faruki, A Bharmal, V Laxmi, V Ganmoor, MS Gaur, M Conti, ...
IEEE communications surveys & tutorials 17 (2), 998-1022, 2014
2842014
AndroSimilar: robust statistical feature signature for Android malware detection
P Faruki, V Ganmoor, V Laxmi, MS Gaur, A Bharmal
Proceedings of the 6th International Conference on Security of Information …, 2013
842013
AndroSimilar: Robust signature for detecting variants of Android malware
P Faruki, V Laxmi, A Bharmal, MS Gaur, V Ganmoor
Journal of Information Security and Applications 22, 66-80, 2015
462015
Evaluation of android anti-malware techniques against dalvik bytecode obfuscation
P Faruki, A Bharmal, V Laxmi, MS Gaur, M Conti, M Rajarajan
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
352014
Mining control flow graph as api call-grams to detect portable executable malware
P Faruki, V Laxmi, MS Gaur, P Vinod
Proceedings of the Fifth International Conference on Security of Information …, 2012
312012
Droidanalyst: Synergic app framework for static and dynamic app analysis
P Faruki, S Bhandari, V Laxmi, M Gaur, M Conti
Recent Advances in Computational Intelligence in Defense and Security, 519-552, 2016
192016
Droidolytics: robust feature signature for repackaged android apps on official and third party android markets
P Faruki, V Laxmi, V Ganmoor, MS Gaur, A Bharmal
2013 2nd international conference on advanced computing, networking and …, 2013
142013
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks
V Laxmi, D Mehta, MS Gaur, P Faruki
Proceedings of the 6th International Conference on Security of Information …, 2013
142013
Behavioural detection with API call-grams to identify malicious PE files
P Faruki, V Laxmi, MS Gaur, P Vinod
Proceedings of the First International Conference on Security of Internet of …, 2012
142012
MCF: MultiComponent features for malware analysis
P Vinod, V Laxmi, MS Gaur, S Naval, P Faruki
2013 27th International Conference on Advanced Information Networking and …, 2013
112013
PEAL—packed executable analysis
V Laxmi, MS Gaur, P Faruki, S Naval
International Conference on Advanced Computing, Networking and Security, 237-243, 2011
102011
Flowmine: Android app analysis via data flow
L Sinha, S Bhandari, P Faruki, MS Gaur, V Laxmi, M Conti
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2016
92016
Platform neutral sandbox for analyzing malware and resource hogger apps
P Faruki, V Kumar, B Ammar, MS Gaur, V Laxmi, M Conti
International Conference on Security and Privacy in Communication Networks …, 2014
82014
Android code protection via obfuscation techniques: Past, present and future directions
P Faruki, H Fereidooni, V Laxmi, M Conti, M Gaur
arXiv preprint arXiv:1611.10231, 2016
52016
Android platform invariant sandbox for analyzing malware and resource hogger apps
P Faruki, V Ganmoor, L Vijay, M Gaur, M Conti
Proceedings of the 10th IEEE International Conference on Security and …, 2014
52014
Secure random encryption for deduplicated storage
J Dave, S Saharan, P Faruki, V Laxmi, MS Gaur
International Conference on Information Systems Security, 164-176, 2017
42017
Secure and efficient proof of ownership for deduplicated cloud storage
J Dave, P Faruki, V Laxmi, B Bezawada, M Gaur
Proceedings of the 10th International Conference on Security of Information …, 2017
42017
Network Intrusion Detection for IoT Security based on Learning Techniques
N Chaabouni, M Mosbah, A Zemmari, C Sauvignac, P Faruki
IEEE Communications Surveys & Tutorials, 2019
32019
MimeoDroid: Large Scale Dynamic App analysis on Cloned Devices via Machine Learning Classifiers.
P Faruki, MS Gaur, V Laxmi, A Zemmari
The 3rd IEEE International Workshop on Reliability and Security Data …, 2016
32016
Android component vulnerabities: Proof of concepts and mitigation
B Buddhdev, P Faruki, M Gaur, V Laxmi
2016 International Conference on Information Networking (ICOIN), 17-22, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20