Machine Learning Based Hybrid Behavior Models for Android Malware Analysis

作者: Hsin-Yu Chuang , Sheng-De Wang

DOI: 10.1109/QRS.2015.37

关键词:

摘要: … build decision models, respectively. The two decision models are combined to form our hybrid… We will compare the proposed hybrid model to the approach with single models generated …

参考文章(33)
Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra, MADAM: A Multi-level Anomaly Detector for Android Malware Lecture Notes in Computer Science. pp. 240- 253 ,(2012) , 10.1007/978-3-642-33704-8_21
Ross Anderson, Hassen Saïdi, Rubin Xu, Aurasium: practical policy enforcement for Android applications usenix security symposium. pp. 27- 27 ,(2012)
Francesco Di Cerbo, Andrea Girardello, Florian Michahelles, Svetlana Voronkova, Detection of malicious applications on Android OS international workshop on computational forensics. pp. 138- 149 ,(2010) , 10.1007/978-3-642-19376-7_12
Yousra Aafer, Wenliang Du, Heng Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 86- 103 ,(2013) , 10.1007/978-3-319-04283-1_6
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Chris Jarabek, David Barrera, John Aycock, ThinAV Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12. pp. 209- 218 ,(2012) , 10.1145/2420950.2420983
S. Y. Yerima, S. Sezer, G. McWilliams, I. Muttik, A New Android Malware Detection Approach Using Bayesian Classification advanced information networking and applications. pp. 121- 128 ,(2013) , 10.1109/AINA.2013.88
Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang, CHEX Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 229- 240 ,(2012) , 10.1145/2382196.2382223
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, Crowdroid Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 15- 26 ,(2011) , 10.1145/2046614.2046619
Erika Chin, Adrienne Porter Felt, Kate Greenwood, David Wagner, Analyzing inter-application communication in Android Proceedings of the 9th international conference on Mobile systems, applications, and services - MobiSys '11. pp. 239- 252 ,(2011) , 10.1145/1999995.2000018