[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Raymond et al., 2023 - Google Patents

Investigation of Android malware using deep learning approach

Raymond et al., 2023

View PDF
Document ID
8860367314547154849
Author
Raymond V
Raj R
Retna J
Publication year
Publication venue
INTELLIGENT AUTOMATION AND SOFT COMPUTING

External Links

Snippet

In recent days the usage of android smartphones has increased extensively by end-users. There are several applications in different categories banking/finance, social engineering, education, sports and fitness, and many more applications. The android stack is more …
Continue reading at cdn.techscience.cn (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Aslan et al. A comprehensive review on malware detection approaches
Sudhakar et al. An emerging threat Fileless malware: a survey and research challenges
Khan et al. Analysis of ResNet and GoogleNet models for malware detection
Alazab Profiling and classifying the behavior of malicious codes
Chumachenko Machine learning methods for malware detection and classification
Shrivastava et al. Attack detection and forensics using honeypot in IoT environment
Aurangzeb et al. BigRC-EML: big-data based ransomware classification using ensemble machine learning
Banin et al. Multinomial malware classification via low-level features
Ahmed Automated analysis approach for the detection of high survivable ransomwares
Vidal et al. A novel pattern recognition system for detecting Android malware by analyzing suspicious boot sequences
Rani et al. Machine learning aided malware detection for secure and smart manufacturing: a comprehensive analysis of the state of the art
Hussain et al. Malware detection using machine learning algorithms for windows platform
Melvin et al. Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud
Bala et al. DroidEnemy: battling adversarial example attacks for Android malware detection
Raymond et al. Investigation of Android malware using deep learning approach
Azad et al. DEEPSEL: A novel feature selection for early identification of malware in mobile applications
Su et al. Anomadroid: Profiling android applications' behaviors for identifying unknown malapps
Akram et al. A systematic literature review: usage of logistic regression for malware detection
García-Teodoro et al. Multi-labeling of complex, multi-behavioral malware samples
Kirubavathi et al. Behavioural based detection of android ransomware using machine learning techniques
Singh et al. It's too late if exfiltrate: Early stage Android ransomware detection
Ravi et al. Android malware detection with classification based on hybrid analysis and N-gram feature extraction
Kumar et al. Malware attacks: dimensions, impact, and defenses
Song et al. A study of the relationship of malware detection mechanisms using Artificial Intelligence
Naït-Abdesselam et al. Malware forensics: Legacy solutions, recent advances, and future challenges