[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kandukuru et al., 2017 - Google Patents

Android malicious application detection using permission vector and network traffic analysis

Kandukuru et al., 2017

Document ID
10786293374744171866
Author
Kandukuru S
Sharma R
Publication year
Publication venue
2017 2nd International Conference for Convergence in Technology (I2CT)

External Links

Snippet

In this technology world, smartphones are greatly adopted by people due to the need of personal communication, Internet and many more requirements. Users are attracted to use the android operating system due its availability for low-cost and millions of freely available …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • G06F9/455Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Programme initiating; Programme switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/485Task life-cycle, e.g. stopping, restarting, resuming execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Qamar et al. Mobile malware attacks: Review, taxonomy & future directions
Talal et al. Comprehensive review and analysis of anti-malware apps for smartphones
Suarez-Tangil et al. Evolution, detection and analysis of malware for smart devices
Mahindru et al. Dynamic permissions based android malware detection using machine learning techniques
Xue et al. Auditing anti-malware tools by evolving android malware and dynamic loading technique
Saracino et al. Madam: Effective and efficient behavior-based android malware detection and prevention
Arshad et al. Android malware detection & protection: a survey
Shabtai et al. Mobile malware detection through analysis of deviations in application network behavior
Faruki et al. Android security: a survey of issues, malware penetration, and defenses
La Polla et al. A survey on security for mobile devices
Bernardi et al. Dynamic malware detection and phylogeny analysis using process mining
Teufl et al. Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
US20180018459A1 (en) Notification of Maliciousness Categorization of Application Programs for Mobile Devices
US20170366562A1 (en) On-Device Maliciousness Categorization of Application Programs for Mobile Devices
US20170337372A1 (en) Maliciousness Categorization of Application Packages Based on Dynamic Analysis
Damopoulos et al. Exposing mobile malware from the inside (or what is your mobile app really doing?)
Kandukuru et al. Android malicious application detection using permission vector and network traffic analysis
Shen et al. Detect android malware variants using component based topology graph
Kim et al. Attack detection application with attack tree for mobile system using log analysis
Faruki et al. Droidanalyst: Synergic app framework for static and dynamic app analysis
Akhtar Malware detection and analysis: Challenges and research opportunities
Ashawa et al. Analysis of mobile malware: a systematic review of evolution and infection strategies
Sk A literature review on android mobile malware detection using machine learning techniques
Yadav et al. A review on malware analysis for iot and android system
Yusof et al. Mobile botnet classification by using hybrid analysis