[go: up one dir, main page]

Chen et al., 2016 - Google Patents

Stormdroid: A streaminglized machine learning-based system for detecting android malware

Chen et al., 2016

View PDF
Document ID
290838360735981561
Author
Chen S
Xue M
Tang Z
Xu L
Zhu H
Publication year
Publication venue
Proceedings of the 11th ACM on Asia conference on computer and communications security

External Links

Snippet

Mobile devices are especially vulnerable nowadays to malware attacks, thanks to the current trend of increased app downloads. Despite the significant security and privacy concerns it received, effective malware detection (MD) remains a significant challenge. This …
Continue reading at sen-chen.github.io (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Chen et al. Stormdroid: A streaminglized machine learning-based system for detecting android malware
Zhang et al. Semantics-aware android malware classification using weighted contextual api dependency graphs
Onwuzurike et al. Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version)
Lei et al. EveDroid: Event-aware Android malware detection against model degrading for IoT devices
Feng et al. A novel dynamic android malware detection system with ensemble learning
Chakraborty et al. Ec2: Ensemble clustering and classification for predicting android malware families
Arshad et al. Android malware detection & protection: a survey
Lin et al. Identifying android malicious repackaged applications by thread-grained system call sequences
Guo et al. An empirical study of malicious code in pypi ecosystem
Garcia et al. Obfuscation-resilient, efficient, and accurate detection and family identification of android malware
Chandramohan et al. A scalable approach for malware detection through bounded feature space behavior modeling
JP6341964B2 (en) System and method for detecting malicious computer systems
Martinelli et al. I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of android malware
Amer Permission-based approach for android malware analysis through ensemble-based voting model
Apvrille et al. Identifying unknown android malware with feature extractions and classification techniques
Arslan et al. A review on mobile threats and machine learning based detection approaches
Gyamfi et al. Survey of mobile malware analysis, detection techniques and tool
Surendran et al. Detection of malware applications from centrality measures of syscall graph
Deylami et al. Taxonomy of malware detection techniques: A systematic literature review
Huang et al. A large-scale study of android malware development phenomenon on public malware submission and scanning platform
Deepserish et al. PET-Droid: Android malware detection using static analysis
AlMasri et al. Detecting Spyware in Android Devices Using Random Forest
Bhavan et al. Android malware detection: A comprehensive review
Thakur et al. Android anti-malware techniques and its vulnerabilities: A survey
Hein Permission based malware protection model for android application