Li et al., 2021 - Google Patents
Semi-supervised two-phase familial analysis of Android malware with normalized graph embeddingLi et al., 2021
- Document ID
- 12733881527809497049
- Author
- Li Q
- Hu Q
- Qi Y
- Qi S
- Liu X
- Gao P
- Publication year
- Publication venue
- Knowledge-Based Systems
External Links
Snippet
With the widespread use of smartphones, Android malware has posed serious threats to its security. Given the explosive growth of Android malware variants, detecting malware families are crucial for identifying new security threats, triaging, and building reference …
- 238000004458 analytical method 0 title abstract description 53
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/4421—Execution paradigms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/445—Programme loading or initiating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/75—Structural analysis for program understanding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Update
- G06F8/68—Incremental; Differential
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Pei et al. | AMalNet: A deep learning framework based on graph convolutional networks for malware detection | |
Zhang et al. | Enhancing state-of-the-art classifiers with api semantics to detect evolved android malware | |
Li et al. | Semi-supervised two-phase familial analysis of Android malware with normalized graph embedding | |
Narayanan et al. | Context-aware, adaptive, and scalable android malware detection through online learning | |
Gascon et al. | Structural detection of android malware using embedded call graphs | |
Gao et al. | Android malware detection via graphlet sampling | |
CN108090360B (en) | A method and system for Android malicious application classification based on behavioral characteristics | |
Wang et al. | LSCDroid: Malware detection based on local sensitive API invocation sequences | |
Song et al. | Permission Sensitivity‐Based Malicious Application Detection for Android | |
US10296743B2 (en) | Method and device for constructing APK virus signature database and APK virus detection system | |
Zhen et al. | DA-GNN: A smart contract vulnerability detection method based on Dual Attention Graph Neural Network | |
CN104636665B (en) | A kind of description of Android application programs and matching process | |
Aldriwish | A Deep Learning Approach for Malware and Software Piracy Threat Detection | |
OS | Detection of malicious android applications using ontology-based intelligent model in mobile cloud environment | |
Narayanan et al. | Contextual weisfeiler-lehman graph kernel for malware detection | |
Feng et al. | Android malware detection via graph representation learning | |
Hamza et al. | A survey and taxonomy of program analysis for IoT platforms | |
Ficco | Comparing api call sequence algorithms for malware detection | |
CN115906086A (en) | Method, system and storage medium for detecting webpage backdoor based on code attribute graph | |
Egitmen et al. | Combat mobile evasive malware via skip‐gram‐based malware detection | |
Hu et al. | A first look at on-device models in ios apps | |
Raza et al. | TL‐GNN: Android Malware Detection Using Transfer Learning | |
Hu et al. | Robust app clone detection based on similarity of ui structure | |
Wang et al. | FAGnet: Family-aware-based android malware analysis using graph neural network | |
Dong et al. | ClassifyDroid: Large scale Android applications classification using semi-supervised Multinomial Naive Bayes |