Chen et al., 2016 - Google Patents
Stormdroid: A streaminglized machine learning-based system for detecting android malwareChen et al., 2016
View PDF- Document ID
- 290838360735981561
- Author
- Chen S
- Xue M
- Tang Z
- Xu L
- Zhu H
- Publication year
- Publication venue
- Proceedings of the 11th ACM on Asia conference on computer and communications security
External Links
Snippet
Mobile devices are especially vulnerable nowadays to malware attacks, thanks to the current trend of increased app downloads. Despite the significant security and privacy concerns it received, effective malware detection (MD) remains a significant challenge. This …
- 238000010801 machine learning 0 title abstract description 25
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chen et al. | Stormdroid: A streaminglized machine learning-based system for detecting android malware | |
Zhang et al. | Semantics-aware android malware classification using weighted contextual api dependency graphs | |
Onwuzurike et al. | Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version) | |
Lei et al. | EveDroid: Event-aware Android malware detection against model degrading for IoT devices | |
Feng et al. | A novel dynamic android malware detection system with ensemble learning | |
Chakraborty et al. | Ec2: Ensemble clustering and classification for predicting android malware families | |
Arshad et al. | Android malware detection & protection: a survey | |
Lin et al. | Identifying android malicious repackaged applications by thread-grained system call sequences | |
Guo et al. | An empirical study of malicious code in pypi ecosystem | |
Garcia et al. | Obfuscation-resilient, efficient, and accurate detection and family identification of android malware | |
Chandramohan et al. | A scalable approach for malware detection through bounded feature space behavior modeling | |
JP6341964B2 (en) | System and method for detecting malicious computer systems | |
Martinelli et al. | I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of android malware | |
Amer | Permission-based approach for android malware analysis through ensemble-based voting model | |
Apvrille et al. | Identifying unknown android malware with feature extractions and classification techniques | |
Arslan et al. | A review on mobile threats and machine learning based detection approaches | |
Gyamfi et al. | Survey of mobile malware analysis, detection techniques and tool | |
Surendran et al. | Detection of malware applications from centrality measures of syscall graph | |
Deylami et al. | Taxonomy of malware detection techniques: A systematic literature review | |
Huang et al. | A large-scale study of android malware development phenomenon on public malware submission and scanning platform | |
Deepserish et al. | PET-Droid: Android malware detection using static analysis | |
AlMasri et al. | Detecting Spyware in Android Devices Using Random Forest | |
Bhavan et al. | Android malware detection: A comprehensive review | |
Thakur et al. | Android anti-malware techniques and its vulnerabilities: A survey | |
Hein | Permission based malware protection model for android application |