Whitelist for Analyzing Android Malware

作者: Kyoungmin Kim , Jeonghwan Lee , Seonguk Lee , Jiman Hong

DOI: 10.1145/3129676.3129726

关键词:

摘要: The number of malicious code targeting the Android platform is increasing day by day. biggest difficulty in analyzing large amount source that needs to be analyzed. larger size code, longer time and time, less accurate result analysis. Generally, application programmers tend use a lot 3rd party libraries it causes increase. 3rd-party library has advantage allowing easily develop applications, but disadvantage including unnecessary codes code. For efficiently would better exclude well known normal which called, white list from original In this paper, we present Whitelist for applications. contains feature information as normal. It can used reducing analyzed when Malware Analyst analyze Experiments show methods using Database greatly reduced analysis shortened.

参考文章(10)
Chenghui Luo, Jian Zhao, Obfuscation of executable code ,(2000)
Haoyu Wang, Yao Guo, Ziang Ma, Xiangqun Chen, WuKong: a scalable and accurate two-phase approach to Android app clone detection international symposium on software testing and analysis. pp. 71- 82 ,(2015) , 10.1145/2771783.2771795
Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan, Android Security: A Survey of Issues, Malware Penetration, and Defenses IEEE Communications Surveys and Tutorials. ,vol. 17, pp. 998- 1022 ,(2015) , 10.1109/COMST.2014.2386139
Michael C. Grace, Wu Zhou, Xuxian Jiang, Ahmad-Reza Sadeghi, Unsafe exposure analysis of mobile in-app advertisements wireless network security. pp. 101- 112 ,(2012) , 10.1145/2185448.2185464
Kai Chen, Peng Liu, Yingjun Zhang, Achieving accuracy and scalability simultaneously in detecting application clones on Android markets international conference on software engineering. pp. 175- 186 ,(2014) , 10.1145/2568225.2568286
Zarni Aung, Win Zaw, Permission-Based Android Malware Detection International Journal of Scientific & Technology Research. ,vol. 2, pp. 228- 234 ,(2013)
Josh Powers, Rhett Smith, Zafer Korkmaz, Husam Ahmed, Whitelist malware defense for embedded control system devices 2015 Saudi Arabia Smart Grid (SASG). pp. 1- 6 ,(2015) , 10.1109/SASG.2015.7449271
Anca Ralescu, Balaji Baskaran, A Study of Android Malware Detection Techniques and Machine Learning MAICS. pp. 15- 23 ,(2016)
Ziang Ma, Haoyu Wang, Yao Guo, Xiangqun Chen, LibRadar: fast and accurate detection of third-party libraries in Android apps international conference on software engineering. pp. 653- 656 ,(2016) , 10.1145/2889160.2889178
Menghao Li, Wei Wang, Pei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo, LibD: scalable and precise third-party library detection in android markets international conference on software engineering. pp. 335- 346 ,(2017) , 10.1109/ICSE.2017.38