Meng et al., 2018 - Google Patents
DroidEcho: an in-depth dissection of malicious behaviors in Android applicationsMeng et al., 2018
View HTML- Document ID
- 7353094939012137900
- Author
- Meng G
- Feng R
- Bai G
- Chen K
- Liu Y
- Publication year
- Publication venue
- Cybersecurity
External Links
Snippet
A precise representation for attacks can benefit the detection of malware in both accuracy and efficiency. However, it is still far from expectation to describe attacks precisely on the Android platform. In addition, new features on Android, such as communication …
- 230000006399 behavior 0 title abstract description 75
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/4421—Execution paradigms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Constructing features for detecting android malicious applications: issues, taxonomy and directions | |
Canfora et al. | Leila: formal tool for identifying mobile malicious behaviour | |
Geneiatakis et al. | A Permission verification approach for android mobile applications | |
Elish et al. | Profiling user-trigger dependence for Android malware detection | |
Yang et al. | Appcontext: Differentiating malicious and benign mobile app behaviors using context | |
Rasthofer et al. | A machine-learning approach for classifying and categorizing android sources and sinks. | |
Wu et al. | A survey of android malware static detection technology based on machine learning | |
Arslan et al. | Permission-based malware detection system for android using machine learning techniques | |
Zhan et al. | Research on third-party libraries in android apps: A taxonomy and systematic literature review | |
Dhawan et al. | Analyzing information flow in JavaScript-based browser extensions | |
Junaid et al. | Dexteroid: Detecting malicious behaviors in android apps using reverse-engineered life cycle models | |
Meng et al. | DroidEcho: an in-depth dissection of malicious behaviors in Android applications | |
Faruki et al. | Droidanalyst: Synergic app framework for static and dynamic app analysis | |
Elish et al. | A static assurance analysis of android applications | |
Bagheri et al. | Automated dynamic enforcement of synthesized security policies in android | |
Fu et al. | Leaksemantic: Identifying abnormal sensitive network transmissions in mobile applications | |
Boxler et al. | Static taint analysis tools to detect information flows | |
Grace et al. | Behaviour analysis of inter-app communication using a lightweight monitoring app for malware detection | |
Du et al. | Withdrawing is believing? detecting inconsistencies between withdrawal choices and third-party data collections in mobile apps | |
Liu et al. | A permission-carrying security policy and static enforcement for information flows in Android programs | |
Liu et al. | A Graph‐Based Feature Generation Approach in Android Malware Detection with Machine Learning Techniques | |
Brutschy et al. | Shamdroid: gracefully degrading functionality in the presence of limited resource access | |
Han et al. | Context awareness through reasoning on private analysis for Android application | |
Sadeghi | Efficient permission-aware analysis of android apps | |
Atzeni et al. | How dangerous is your Android app? An evaluation methodology |