An Android Application Sandbox system for suspicious software detection

作者: Thomas Bläsing , Leonid Batyuk , Aubrey-Derrick Schmidt , Seyit Ahmet Camtepe , Sahin Albayrak

DOI: 10.1109/MALWARE.2010.5665792

关键词: Mobile computingAndroid (operating system)Embedded systemLinux kernelOperating systemMalwareCloud computingMobile malwareMobile deviceSandbox (computer security)Computer science

摘要: … After that, applications are executed and can be used within the sandbox … sandbox is presented. Section 4 presents possible analysing procedures that can be performed in our sandbox…

参考文章(24)
Thomas Raffetseder, Christopher Kruegel, Engin Kirda, Detecting System Emulators Lecture Notes in Computer Science. pp. 1- 18 ,(2007) , 10.1007/978-3-540-75496-1_1
Farnam Jahanian, Jon Oberheide, Evan Cooke, CloudAV: N-version antivirus in the network cloud usenix security symposium. pp. 91- 106 ,(2008)
Matthew A. Bishop, The Art and Science of Computer Security Addison-Wesley Longman Publishing Co., Inc.. ,(2002)
N. Tawbi, M. Debbabi, J. Desharnais, Y. Lavoie, J. Bergeron, M. M. Erhioui, Static Detection of Malicious Code in Executable Programs ,(2000)
Tal Garfinkel, Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. network and distributed system security symposium. ,(2003)
Roland Schemers, Marianne Mueller, Li Gong, Hemma Prafullchandra, Going beyond the sandbox: an overview of the new security architecture in the java TM development Kit 1.2 usenix symposium on internet technologies and systems. pp. 10- 10 ,(1997)
Denis Gopan, Thomas Reps, Low-Level Library Analysis and Summarization Computer Aided Verification. pp. 68- 81 ,(2007) , 10.1007/978-3-540-73368-3_10
M. Dornseif, C.N. Klein, T. Holz, NoSEBrEaK - attacking honeynets Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.. pp. 123- 129 ,(2004) , 10.1109/IAW.2004.1437807
Darren Mutz, William Robertson, Giovanni Vigna, Richard Kemmerer, Exploiting execution context for the detection of anomalous system calls recent advances in intrusion detection. pp. 1- 20 ,(2007) , 10.1007/978-3-540-74320-0_1
Robert D. Love, Linux System Programming ,(2007)