A novel approach for mobile malware classification and detection in Android systems

作者: Qingguo Zhou , Fang Feng , Zebang Shen , Rui Zhou , Meng-Yen Hsieh

DOI: 10.1007/S11042-018-6498-Z

关键词:

摘要: With the increasing number of malicious attacks, the way how to detect malicious Apps has drawn attention in mobile technology market. In this paper, we proposed a detection model to …

参考文章(28)
Adrienne Porter Felt, Kate Greenwood, David Wagner, The effectiveness of application permissions usenix conference on web application development. pp. 7- 7 ,(2011)
Huaming Chen, Hong Zhao, Jun Shen, Rui Zhou, Qingguo Zhou, Supervised Machine Learning Model for High Dimensional Gene Data in Colon Cancer Detection 2015 IEEE International Congress on Big Data. pp. 134- 141 ,(2015) , 10.1109/BIGDATACONGRESS.2015.28
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, Andromaly: a behavioral malware detection framework for android devices intelligent information systems. ,vol. 38, pp. 161- 190 ,(2012) , 10.1007/S10844-010-0148-X
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning, Detecting repackaged smartphone applications in third-party android marketplaces Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12. pp. 317- 326 ,(2012) , 10.1145/2133601.2133640
Mojtaba Eskandari, Sattar Hashemi, A graph mining approach for detecting unknown malwares Journal of Visual Languages and Computing. ,vol. 23, pp. 154- 162 ,(2012) , 10.1016/J.JVLC.2012.02.002
Tao Xie, William Enck, Xusheng Xiao, Sihan Li, Benjamin Andow, Wei Yang, AppContext: differentiating malicious and benign mobile app behaviors using context international conference on software engineering. ,vol. 1, pp. 303- 313 ,(2015) , 10.5555/2818754.2818793
Alexis Mylonas, Dimitris Gritzalis, Book review: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Computers & Security. ,vol. 31, pp. 802- 803 ,(2012) , 10.1016/J.COSE.2012.05.004
David Barrera, H. G üne ş Kayacik, Paul C. van Oorschot, Anil Somayaji, A methodology for empirical analysis of permission-based security models and its application to android Proceedings of the 17th ACM conference on Computer and communications security - CCS '10. pp. 73- 84 ,(2010) , 10.1145/1866307.1866317
Erika Chin, Adrienne Porter Felt, Kate Greenwood, David Wagner, Analyzing inter-application communication in Android Proceedings of the 9th international conference on Mobile systems, applications, and services - MobiSys '11. pp. 239- 252 ,(2011) , 10.1145/1999995.2000018
Takamasa Isohara, Keisuke Takemori, Ayumu Kubota, Kernel-based Behavior Analysis for Android Malware Detection computational intelligence and security. pp. 1011- 1015 ,(2011) , 10.1109/CIS.2011.226