Unmasking Android Obfuscation Tools Using Spatial Analysis

作者: Ratinder Kaur , Ye Ning , Hugo Gonzalez , Natalia Stakhanova

DOI: 10.1109/PST.2018.8514207

关键词: Feature extractionJavaAndroid malwareComputer securityData visualizationAndroid (operating system)Obfuscation (software)Computer scienceMalware

摘要: Android has become one of the most popular mo-bile device operating systems. Indeed, its security issues have attracted a lot of attention. One of the major security concerns is the use …

参考文章(21)
Chundong Wang, Zhiyuan Li, Liangyi Gong, Xiuliang Mo, Hong Yang, Yi Zhao, An Android Malicious Code Detection Method Based on Improved DCA Algorithm Entropy. ,vol. 19, pp. 65- ,(2017) , 10.3390/E19020065
Yan Wang, Atanas Rountev, Who changed you?: obfuscator identification for Android 2017 IEEE/ACM 4th International Conference on Mobile Software Engineering and Systems (MOBILESoft). pp. 154- 164 ,(2017) , 10.1109/MOBILESOFT.2017.18
Christian Collberg, Douglas Low, C. Thomborson, A Taxonomy of Obfuscating Transformations Department of Computer Science, The University of Auckland, New Zealand. ,(1997)
Michal Strzelecki, Andrzej Materka, Texture Analysis Methods - A Review ,(1998)
John Donahue, Anand Paturi, Srinivas Mukkamala, Visualization techniques for efficient malware detection intelligence and security informatics. pp. 289- 291 ,(2013) , 10.1109/ISI.2013.6578845
L. Nataraj, S. Karthikeyan, G. Jacob, B. S. Manjunath, Malware images: visualization and automatic classification visualization for computer security. pp. 4- ,(2011) , 10.1145/2016904.2016908
KyoungSoo Han, BooJoong Kang, Eul Gyu Im, Malware analysis using visualized image matrices. The Scientific World Journal. ,vol. 2014, pp. 132713- 132713 ,(2014) , 10.1155/2014/132713
Robert M. Haralick, K. Shanmugam, Its'Hak Dinstein, Textural Features for Image Classification IEEE Transactions on Systems, Man, and Cybernetics. ,vol. SMC-3, pp. 610- 621 ,(1973) , 10.1109/TSMC.1973.4309314
A. Shabtai, L. Tenenboim-Chekina, D. Mimran, L. Rokach, B. Shapira, Y. Elovici, Mobile malware detection through analysis of deviations in application network behavior Computers & Security. ,vol. 43, pp. 1- 18 ,(2014) , 10.1016/J.COSE.2014.02.009
R.M. Haralick, Statistical and structural approaches to texture Proceedings of the IEEE. ,vol. 67, pp. 786- 804 ,(1979) , 10.1109/PROC.1979.11328