El Fiky et al., 2021 - Google Patents
A Survey of Malware Detection Techniques for Android DevicesEl Fiky et al., 2021
View PDF- Document ID
- 463361450493345675
- Author
- El Fiky A
- El Shenawy A
- Madkour M
- Publication year
- Publication venue
- AL-AZHAR ENGINEERING FIFTEETHEN INTERNATIONAL CONFERENCE
External Links
Snippet
The Android operating system platform has become the fastest growing mobile OS because of its open-source nature that makes it the most preferred OS for many developers and customers. To enhance security, it is crucial to develop effective techniques to detect …
- 238000001514 detection method 0 title abstract description 62
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/564—Static detection by virus signature recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Review of android malware detection based on deep learning | |
Aslan et al. | Intelligent behavior-based malware detection system on cloud computing environment | |
Chakraborty et al. | Ec2: Ensemble clustering and classification for predicting android malware families | |
Odat et al. | A novel machine learning approach for android malware detection based on the co-existence of features | |
Pachhala et al. | A comprehensive survey on identification of malware types and malware classification using machine learning techniques | |
Zhao et al. | A review of computer vision methods in network security | |
Lindorfer et al. | Marvin: Efficient and comprehensive mobile app classification through static and dynamic analysis | |
US9088601B2 (en) | Method and apparatus for detecting malicious software through contextual convictions, generic signatures and machine learning techniques | |
Abawajy et al. | Large iterative multitier ensemble classifiers for security of big data | |
Dehkordy et al. | A new machine learning-based method for android malware detection on imbalanced dataset | |
Jang et al. | Detecting and classifying method based on similarity matching of Android malware behavior with profile | |
Huang et al. | Deep android malware classification with API-based feature graph | |
Akhtar | Malware detection and analysis: Challenges and research opportunities | |
Li et al. | An android malware detection system based on feature fusion | |
Sun et al. | Contaminant removal for android malware detection systems | |
Casolare et al. | On the resilience of shallow machine learning classification in image-based malware detection | |
Hoang et al. | Detecting malware based on statistics and machine learning using opcode n-grams | |
Hamza et al. | Malicious URL and intrusion detection using machine learning | |
AliAhmad et al. | Malware detection issues, future trends and challenges: a survey | |
Berger et al. | Crystal ball: From innovative attacks to attack effectiveness classifier | |
Rahman et al. | An exploratory analysis of feature selection for malware detection with simple machine learning algorithms | |
Hammi et al. | Malware detection through windows system call analysis | |
Gysel et al. | Eagleeye: attention to unveil malicious event sequences from provenance graphs | |
El Fiky et al. | A Survey of Malware Detection Techniques for Android Devices | |
Chrysikos et al. | Permission-based classification of android malware applications using random forest |