Zhang et al., 2014 - Google Patents
Semantics-aware android malware classification using weighted contextual api dependency graphsZhang et al., 2014
View PDF- Document ID
- 9822829058928924582
- Author
- Zhang M
- Duan Y
- Yin H
- Zhao Z
- Publication year
- Publication venue
- Proceedings of the 2014 ACM SIGSAC conference on computer and communications security
External Links
Snippet
The drastic increase of Android malware has led to a strong interest in developing methods to automate the malware analysis process. Existing automated Android malware detection and classification methods fall into two general categories: 1) signature-based and 2) …
- 238000001514 detection method 0 abstract description 75
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
- G06K9/32—Aligning or centering of the image pick-up or image-field
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zhang et al. | Semantics-aware android malware classification using weighted contextual api dependency graphs | |
| Wang et al. | Constructing features for detecting android malicious applications: issues, taxonomy and directions | |
| Chen et al. | Stormdroid: A streaminglized machine learning-based system for detecting android malware | |
| Xu et al. | Iccdetector: Icc-based malware detection on android | |
| US20160057159A1 (en) | Semantics-aware android malware classification | |
| Feng et al. | A novel dynamic android malware detection system with ensemble learning | |
| İbrahim et al. | A method for automatic android malware detection based on static analysis and deep learning | |
| Suarez-Tangil et al. | Droidsieve: Fast and accurate classification of obfuscated android malware | |
| Bernardi et al. | Dynamic malware detection and phylogeny analysis using process mining | |
| Chen et al. | Finding unknown malice in 10 seconds: Mass vetting for new threats at the {Google-Play} scale | |
| Guo et al. | An empirical study of malicious code in pypi ecosystem | |
| Homayoun et al. | A blockchain-based framework for detecting malicious mobile applications in app stores | |
| Zhou et al. | Harvesting developer credentials in android apps | |
| Aslan et al. | Using a subtractive center behavioral model to detect malware | |
| Apvrille et al. | Identifying unknown android malware with feature extractions and classification techniques | |
| Shen et al. | Detect android malware variants using component based topology graph | |
| Yang et al. | APKLancet: tumor payload diagnosis and purification for android applications | |
| Wang et al. | Beyond the virus: A first look at coronavirus-themed mobile malware | |
| Martinelli et al. | I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of android malware | |
| Gandotra et al. | Integrated framework for classification of malwares | |
| Faruki et al. | Droidanalyst: Synergic app framework for static and dynamic app analysis | |
| Han et al. | Identifying malicious Android apps using permissions and system events | |
| Jang et al. | Function‐Oriented Mobile Malware Analysis as First Aid | |
| Zheng et al. | Towards robust detection of open source software supply chain poisoning attacks in industry environments | |
| Deepserish et al. | PET-Droid: Android malware detection using static analysis |