Detecting Android malware using sequences of system calls

作者: Gerardo Canfora , Eric Medvet , Francesco Mercaldo , Corrado Aaron Visaggio

DOI: 10.1145/2804345.2804349

关键词:

摘要: … We propose a malware detection technique based on dynamic analysis which considers sequences of system calls that are likely to occur more in malware than in non-malware …

参考文章(29)
Gerardo Canfora, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio, Detection of Malicious Web Pages Using System Calls Sequences Advanced Information Systems Engineering. ,vol. 8708, pp. 226- 238 ,(2014) , 10.1007/978-3-319-10975-6_17
A.H. Sung, J. Xu, P. Chavez, S. Mukkamala, Static analyzer of vicious executables (SAVE) annual computer security applications conference. pp. 326- 334 ,(2004) , 10.1109/CSAC.2004.37
Sahin Albayrak, Seyit Camtepe, Jan Clausen, Aubrey-Derrick Schmidt, Kamer Ail Yuksel, Hans-Gunterh Schmidt, Kiraz Osman, Enhancing security of linux-based android devices School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty. ,(2008)
Ross Anderson, Hassen Saïdi, Rubin Xu, Aurasium: practical policy enforcement for Android applications usenix security symposium. pp. 27- 27 ,(2012)
Francesco Di Cerbo, Andrea Girardello, Florian Michahelles, Svetlana Voronkova, Detection of malicious applications on Android OS international workshop on computational forensics. pp. 138- 149 ,(2010) , 10.1007/978-3-642-19376-7_12
Engin Kirda, Paolo Milani Comparetti, Christopher Kruegel, Clemens Kolbitsch, Xiaoyong Zhou, XiaoFeng Wang, Effective and efficient malware detection at the end host usenix security symposium. pp. 351- 366 ,(2009)
A. M. Aswini, P. Vinod, Droid permission miner: Mining prominent permissions for Android malware analysis international conference on applications of digital information and web technologies. pp. 81- 86 ,(2014) , 10.1109/ICADIWT.2014.6814679
Youn-sik Jeong, Hwan-taek Lee, Seong-je Cho, Sangchul Han, Minkyu Park, A kernel-based monitoring approach for analyzing malicious behavior on Android acm symposium on applied computing. pp. 1737- 1738 ,(2014) , 10.1145/2554850.2559915
David Barrera, H. G üne ş Kayacik, Paul C. van Oorschot, Anil Somayaji, A methodology for empirical analysis of permission-based security models and its application to android Proceedings of the 17th ACM conference on Computer and communications security - CCS '10. pp. 73- 84 ,(2010) , 10.1145/1866307.1866317
Asaf Shabtai, Robert Moskovitch, Yuval Elovici, Chanan Glezer, Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey Information Security Technical Report. ,vol. 14, pp. 16- 29 ,(2009) , 10.1016/J.ISTR.2009.03.003