Niu et al., 2024 - Google Patents
Introduction of Android malware detectionNiu et al., 2024
- Document ID
- 3855999456903755243
- Author
- Niu W
- Zhang X
- Yan R
- Gong J
- Publication year
- Publication venue
- Android Malware Detection and Adversarial Methods
External Links
Snippet
Android is currently the most popular mobile operating system with over 80% market share. Android's openness and flexibility provide users and developers with a wealth of features and choices, but it also poses many security risks, generating a large amount of malware …
- 238000001514 detection method 0 title description 120
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Aslan et al. | A comprehensive review on malware detection approaches | |
Kouliaridis et al. | A survey on mobile malware detection techniques | |
Demme et al. | On the feasibility of online malware detection with performance counters | |
Bernardi et al. | Dynamic malware detection and phylogeny analysis using process mining | |
Abawajy et al. | Identifying cyber threats to mobile-IoT applications in edge computing paradigm | |
Karim et al. | SMARTbot: A behavioral analysis framework augmented with machine learning to identify mobile botnet applications | |
Jang et al. | Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information | |
Banin et al. | Multinomial malware classification via low-level features | |
Aslan et al. | Using a subtractive center behavioral model to detect malware | |
Selvaganapathy et al. | A review on android malware: Attacks, countermeasures and challenges ahead | |
Akhtar | Malware detection and analysis: Challenges and research opportunities | |
Milosevic et al. | Malware threats and solutions for trustworthy mobile systems design | |
Yadav et al. | A review on malware analysis for iot and android system | |
Bayazit et al. | Protecting Android Devices from Malware Attacks: A State-of-the-Art Report of Concepts, Modern Learning Models and Challenges | |
Tari et al. | Data Exfiltration threats and prevention techniques: Machine Learning and memory-based data security | |
AlMasri et al. | Detecting Spyware in Android Devices Using Random Forest | |
Gupta et al. | Developing a blockchain-based and distributed database-oriented multi-malware detection engine | |
Niu et al. | Introduction of Android malware detection | |
Dahiya | Malware detection in IoT | |
Ferdous et al. | Malware resistant data protection in hyper-connected networks: A survey | |
Samantray et al. | A theoretical feature-wise study of malware detection techniques | |
Emmah et al. | Review of malware and techniques for combating zero-day attacks | |
Shahzad et al. | A survey on recent advances in malicious applications analysis and detection techniques for smartphones | |
Sarath et al. | Malware forensics analysis and detection in cyber physical systems | |
Arse et al. | Mitigating Malware Attacks using Machine Learning: A Review |