[go: up one dir, main page]

Niu et al., 2024 - Google Patents

Introduction of Android malware detection

Niu et al., 2024

Document ID
3855999456903755243
Author
Niu W
Zhang X
Yan R
Gong J
Publication year
Publication venue
Android Malware Detection and Adversarial Methods

External Links

Snippet

Android is currently the most popular mobile operating system with over 80% market share. Android's openness and flexibility provide users and developers with a wealth of features and choices, but it also poses many security risks, generating a large amount of malware …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities

Similar Documents

Publication Publication Date Title
Aslan et al. A comprehensive review on malware detection approaches
Kouliaridis et al. A survey on mobile malware detection techniques
Demme et al. On the feasibility of online malware detection with performance counters
Bernardi et al. Dynamic malware detection and phylogeny analysis using process mining
Abawajy et al. Identifying cyber threats to mobile-IoT applications in edge computing paradigm
Karim et al. SMARTbot: A behavioral analysis framework augmented with machine learning to identify mobile botnet applications
Jang et al. Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information
Banin et al. Multinomial malware classification via low-level features
Aslan et al. Using a subtractive center behavioral model to detect malware
Selvaganapathy et al. A review on android malware: Attacks, countermeasures and challenges ahead
Akhtar Malware detection and analysis: Challenges and research opportunities
Milosevic et al. Malware threats and solutions for trustworthy mobile systems design
Yadav et al. A review on malware analysis for iot and android system
Bayazit et al. Protecting Android Devices from Malware Attacks: A State-of-the-Art Report of Concepts, Modern Learning Models and Challenges
Tari et al. Data Exfiltration threats and prevention techniques: Machine Learning and memory-based data security
AlMasri et al. Detecting Spyware in Android Devices Using Random Forest
Gupta et al. Developing a blockchain-based and distributed database-oriented multi-malware detection engine
Niu et al. Introduction of Android malware detection
Dahiya Malware detection in IoT
Ferdous et al. Malware resistant data protection in hyper-connected networks: A survey
Samantray et al. A theoretical feature-wise study of malware detection techniques
Emmah et al. Review of malware and techniques for combating zero-day attacks
Shahzad et al. A survey on recent advances in malicious applications analysis and detection techniques for smartphones
Sarath et al. Malware forensics analysis and detection in cyber physical systems
Arse et al. Mitigating Malware Attacks using Machine Learning: A Review