Kandukuru et al., 2017 - Google Patents
Android malicious application detection using permission vector and network traffic analysisKandukuru et al., 2017
- Document ID
- 10786293374744171866
- Author
- Kandukuru S
- Sharma R
- Publication year
- Publication venue
- 2017 2nd International Conference for Convergence in Technology (I2CT)
External Links
Snippet
In this technology world, smartphones are greatly adopted by people due to the need of personal communication, Internet and many more requirements. Users are attracted to use the android operating system due its availability for low-cost and millions of freely available …
- 238000004458 analytical method 0 title abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Programme initiating; Programme switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/485—Task life-cycle, e.g. stopping, restarting, resuming execution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Qamar et al. | Mobile malware attacks: Review, taxonomy & future directions | |
Talal et al. | Comprehensive review and analysis of anti-malware apps for smartphones | |
Suarez-Tangil et al. | Evolution, detection and analysis of malware for smart devices | |
Mahindru et al. | Dynamic permissions based android malware detection using machine learning techniques | |
Xue et al. | Auditing anti-malware tools by evolving android malware and dynamic loading technique | |
Saracino et al. | Madam: Effective and efficient behavior-based android malware detection and prevention | |
Arshad et al. | Android malware detection & protection: a survey | |
Shabtai et al. | Mobile malware detection through analysis of deviations in application network behavior | |
Faruki et al. | Android security: a survey of issues, malware penetration, and defenses | |
La Polla et al. | A survey on security for mobile devices | |
Bernardi et al. | Dynamic malware detection and phylogeny analysis using process mining | |
Teufl et al. | Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) | |
US20180018459A1 (en) | Notification of Maliciousness Categorization of Application Programs for Mobile Devices | |
US20170366562A1 (en) | On-Device Maliciousness Categorization of Application Programs for Mobile Devices | |
US20170337372A1 (en) | Maliciousness Categorization of Application Packages Based on Dynamic Analysis | |
Damopoulos et al. | Exposing mobile malware from the inside (or what is your mobile app really doing?) | |
Kandukuru et al. | Android malicious application detection using permission vector and network traffic analysis | |
Shen et al. | Detect android malware variants using component based topology graph | |
Kim et al. | Attack detection application with attack tree for mobile system using log analysis | |
Faruki et al. | Droidanalyst: Synergic app framework for static and dynamic app analysis | |
Akhtar | Malware detection and analysis: Challenges and research opportunities | |
Ashawa et al. | Analysis of mobile malware: a systematic review of evolution and infection strategies | |
Sk | A literature review on android mobile malware detection using machine learning techniques | |
Yadav et al. | A review on malware analysis for iot and android system | |
Yusof et al. | Mobile botnet classification by using hybrid analysis |