Android malware classification method: Dalvik bytecode frequency analysis

作者: Byeongho Kang , BooJoong Kang , Jungtae Kim , Eul Gyu Im

DOI: 10.1145/2513228.2513295

关键词:

摘要: … Given an application pool , each Android application has a Bytecode frequency set. The frequency set of the i-th application is notated as . In the frequency set, each j-th element …

参考文章(10)
Igor Santos, Felix Brezo, Javier Nieves, Yoseba K. Penya, Borja Sanz, Carlos Laorden, Pablo G. Bringas, Idea: Opcode-Sequence-Based Malware Detection Lecture Notes in Computer Science. pp. 35- 43 ,(2010) , 10.1007/978-3-642-11747-3_3
Alexander Moshchuk, Adrienne Porter Felt, Helen J. Wang, Erika Chin, Steven Hanna, Permission re-delegation: attacks and defenses usenix security symposium. pp. 22- 22 ,(2011)
Patrick P.F. Chan, Lucas C.K. Hui, S.M. Yiu, A privilege escalation vulnerability checking system for android applications international conference on communication technology. pp. 681- 686 ,(2011) , 10.1109/ICCT.2011.6157963
Daniel Bilar, Opcodes as predictor for malware International Journal of Electronic Security and Digital Forensics. ,vol. 1, pp. 156- 168 ,(2007) , 10.1504/IJESDF.2007.016865
Patrick P.F. Chan, Lucas C.K. Hui, S. M. Yiu, DroidChecker: analyzing android applications for capability leak wireless network security. pp. 125- 136 ,(2012) , 10.1145/2185448.2185466
Yajin Zhou, Xuxian Jiang, Dissecting Android Malware: Characterization and Evolution ieee symposium on security and privacy. pp. 95- 109 ,(2012) , 10.1109/SP.2012.16
Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, Ian H. Witten, The WEKA data mining software ACM SIGKDD Explorations Newsletter. ,vol. 11, pp. 10- 18 ,(2009) , 10.1145/1656274.1656278
Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy, Privilege escalation attacks on android international conference on information security. pp. 346- 360 ,(2010) , 10.1007/978-3-642-18178-8_30
Xuxian Jiang, Yajin Zhou, Wu Zhou, Zhi Wang, Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets network and distributed system security symposium. ,(2012)
Leo Breiman, Random Forests Machine Learning archive. ,vol. 45, pp. 5- 32 ,(2001) , 10.1023/A:1010933404324