+

Zhang et al., 2014 - Google Patents

Semantics-aware android malware classification using weighted contextual api dependency graphs

Zhang et al., 2014

View PDF
Document ID
9822829058928924582
Author
Zhang M
Duan Y
Yin H
Zhao Z
Publication year
Publication venue
Proceedings of the 2014 ACM SIGSAC conference on computer and communications security

External Links

Snippet

The drastic increase of Android malware has led to a strong interest in developing methods to automate the malware analysis process. Existing automated Android malware detection and classification methods fall into two general categories: 1) signature-based and 2) …
Continue reading at ink.library.smu.edu.sg (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • G06K9/32Aligning or centering of the image pick-up or image-field

Similar Documents

Publication Publication Date Title
Zhang et al. Semantics-aware android malware classification using weighted contextual api dependency graphs
Wang et al. Constructing features for detecting android malicious applications: issues, taxonomy and directions
Chen et al. Stormdroid: A streaminglized machine learning-based system for detecting android malware
Xu et al. Iccdetector: Icc-based malware detection on android
US20160057159A1 (en) Semantics-aware android malware classification
Feng et al. A novel dynamic android malware detection system with ensemble learning
İbrahim et al. A method for automatic android malware detection based on static analysis and deep learning
Suarez-Tangil et al. Droidsieve: Fast and accurate classification of obfuscated android malware
Bernardi et al. Dynamic malware detection and phylogeny analysis using process mining
Chen et al. Finding unknown malice in 10 seconds: Mass vetting for new threats at the {Google-Play} scale
Guo et al. An empirical study of malicious code in pypi ecosystem
Homayoun et al. A blockchain-based framework for detecting malicious mobile applications in app stores
Zhou et al. Harvesting developer credentials in android apps
Aslan et al. Using a subtractive center behavioral model to detect malware
Apvrille et al. Identifying unknown android malware with feature extractions and classification techniques
Shen et al. Detect android malware variants using component based topology graph
Yang et al. APKLancet: tumor payload diagnosis and purification for android applications
Wang et al. Beyond the virus: A first look at coronavirus-themed mobile malware
Martinelli et al. I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of android malware
Gandotra et al. Integrated framework for classification of malwares
Faruki et al. Droidanalyst: Synergic app framework for static and dynamic app analysis
Han et al. Identifying malicious Android apps using permissions and system events
Jang et al. Function‐Oriented Mobile Malware Analysis as First Aid
Zheng et al. Towards robust detection of open source software supply chain poisoning attacks in industry environments
Deepserish et al. PET-Droid: Android malware detection using static analysis
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载