[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Meng et al., 2018 - Google Patents

DroidEcho: an in-depth dissection of malicious behaviors in Android applications

Meng et al., 2018

View HTML @Full View
Document ID
7353094939012137900
Author
Meng G
Feng R
Bai G
Chen K
Liu Y
Publication year
Publication venue
Cybersecurity

External Links

Snippet

A precise representation for attacks can benefit the detection of malware in both accuracy and efficiency. However, it is still far from expectation to describe attacks precisely on the Android platform. In addition, new features on Android, such as communication …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • G06F9/4421Execution paradigms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3612Software analysis for verifying properties of programs by runtime analysis

Similar Documents

Publication Publication Date Title
Wang et al. Constructing features for detecting android malicious applications: issues, taxonomy and directions
Canfora et al. Leila: formal tool for identifying mobile malicious behaviour
Geneiatakis et al. A Permission verification approach for android mobile applications
Elish et al. Profiling user-trigger dependence for Android malware detection
Yang et al. Appcontext: Differentiating malicious and benign mobile app behaviors using context
Rasthofer et al. A machine-learning approach for classifying and categorizing android sources and sinks.
Wu et al. A survey of android malware static detection technology based on machine learning
Arslan et al. Permission-based malware detection system for android using machine learning techniques
Zhan et al. Research on third-party libraries in android apps: A taxonomy and systematic literature review
Dhawan et al. Analyzing information flow in JavaScript-based browser extensions
Junaid et al. Dexteroid: Detecting malicious behaviors in android apps using reverse-engineered life cycle models
Meng et al. DroidEcho: an in-depth dissection of malicious behaviors in Android applications
Faruki et al. Droidanalyst: Synergic app framework for static and dynamic app analysis
Elish et al. A static assurance analysis of android applications
Bagheri et al. Automated dynamic enforcement of synthesized security policies in android
Fu et al. Leaksemantic: Identifying abnormal sensitive network transmissions in mobile applications
Boxler et al. Static taint analysis tools to detect information flows
Grace et al. Behaviour analysis of inter-app communication using a lightweight monitoring app for malware detection
Du et al. Withdrawing is believing? detecting inconsistencies between withdrawal choices and third-party data collections in mobile apps
Liu et al. A permission-carrying security policy and static enforcement for information flows in Android programs
Liu et al. A Graph‐Based Feature Generation Approach in Android Malware Detection with Machine Learning Techniques
Brutschy et al. Shamdroid: gracefully degrading functionality in the presence of limited resource access
Han et al. Context awareness through reasoning on private analysis for Android application
Sadeghi Efficient permission-aware analysis of android apps
Atzeni et al. How dangerous is your Android app? An evaluation methodology