Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








187 Hits in 4.9 sec

Mystique

Guozhu Meng, Yinxing Xue, Chandramohan Mahinthan, Annamalai Narayanan, Yang Liu, Jie Zhang, Tieming Chen
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
Thus, it is desired to conduct a systematic investigation and evaluation of anti-malware solutions and tools based on different attacks and evasion techniques.  ...  With the help of MYSTIQUE, we conduct experiments to 1) understand Android malware and the associated attack features as well as evasion techniques; 2) evaluate and compare the 57 off-the-shelf anti-malware  ...  This work is also sponsored by the National Science Foundation of China (No. 61572349, 61272106) .  ... 
doi:10.1145/2897845.2897856 dblp:conf/ccs/MengXCN0ZC16 fatcat:ssubdviipffe3k5lc7ue2evzu4

Malware Analysis and Detection on Android: The Big Challenge [chapter]

Abraham Rodríguez-Mota, Ponciano J. Escamilla-Ambrosio, Moisés Salinas-Rosales
2017 Smartphones from an Applied Research Perspective  
We start by briefly describing the Android's security model, followed by a discussion of the static and dynamic malware analysis techniques in order to provide a general view of the analysis and detection  ...  The main contribution of this chapter is a description of the realization of static and dynamic malware analysis techniques and principles that can be automated and mapped to software system tools in order  ...  y Posgrado under grant numbers 1894 and 20170344.  ... 
doi:10.5772/intechopen.69695 fatcat:ogfid4ptu5dlnflintz4vbbcf4

Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection

Luca Caviglione, Michal Choras, Igino Corona, Artur Janicki, Wojciech Mazurczyk, Marek Pawlicki, Katarzyna Wasielewska
2020 IEEE Access  
That is why, in this paper we first perform a detailed meta-review of the existing surveys related to malware and its detection techniques, showing an arms race between these two sides of a barricade.  ...  At present, the complexity, proliferation, and variety of malware pose a real challenge for the existing countermeasures and require their constant improvements.  ...  The survey in [13] focused on the dynamic analysis techniques that can be used to inspect malware samples without the limitations of static tools.  ... 
doi:10.1109/access.2020.3048319 fatcat:tatdk6pzczgp3aylvbxoxabuta

A5

Timothy Vidas, Jiaqi Tan, Jay Nahata, Chaur Lih Tan, Nicolas Christin, Patrick Tague
2014 Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices - SPSM '14  
the data needed, and completing and reviewing the collection of information.  ...  Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining  ...  Acknowledgments This work was supported in part by CyLab at Carnegie Mellon under grant DAAD19-02-1-0389 from the Army Research Office, and by the National Science Foundation under IGERT award DGE-0903659  ... 
doi:10.1145/2666620.2666630 dblp:conf/ccs/VidasTNTCT14 fatcat:ici7llzn4zafbmolrmlrpfnjkm

Information flow based defensive chain for data leakage detection and prevention: a survey [article]

Ning Xi, Chao Chen, Jun Zhang, Cong Sun, Shigang Liu, Pengbin Feng, Jianfeng Ma
2021 arXiv   pre-print
Research communities and industries have proposed many Information Flow Control (IFC) techniques for data leakage detection and prevention, including secure modeling, type system, static analysis, dynamic  ...  Mobile and IoT applications have greatly enriched our daily life by providing convenient and intelligent services.  ...  [139] presented a survey on emerging Android malware analysis and detection techniques, along with their effectiveness against evolving malware.  ... 
arXiv:2106.04951v1 fatcat:apib4mmp3va43dv5he7xu3aay4

Malware Analysis in IoT & Android Systems with Defensive Mechanism

Chandra Shekhar Yadav, Jagendra Singh, Aruna Yadav, Himansu Sekhar Pattanayak, Ravindra Kumar, Arfat Ahmad Khan, Mohd Anul Haq, Ahmed Alhussen, Sultan Alharby
2022 Electronics  
This article classifies different attacks on IoT and Android devices and mitigation strategies proposed by different researchers.  ...  Android devices connect to different IoT devices such as IoT-enabled cameras, Alexa powered by Amazon, and various other sensors.  ...  Ethical Approval: This article does not contain any studies with human participants performed by any of the authors.  ... 
doi:10.3390/electronics11152354 fatcat:saf2a2bb6rdznkbgdukxb3s4fe

An Efficient Auditing Protocol For Information Sharing And Secured Distributed Storage

Samuel Solomon
2022 Zenodo  
The record put away in the cloud can be shared and utilized by others dependingon the prerequisite that the touchy data of the document is ensured.  ...  The security evidence and the exploratory investigation exhibit that the proposed plot accomplishes attractive security and productivity.  ...  TITLE: Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique AUTHOR: Yinxing Xue, Guozhu Meng, Yang Liu, Tian Huat Tan, Hongxu Chen, Jun Sun, and Jie Zhang YEAR: 2015  ... 
doi:10.5281/zenodo.7136919 fatcat:wrbndodalveqng6spsn6eisjte

Machine Learning-Based Routing and Wavelength Assignment in Software-Defined Optical Networks

Ignacio Martin, Sebastian Troia, Jose Alberto Hernandez, Alberto Rodriguez, Francesco Musumeci, Guido Maier, Rodolfo Alvizu, Oscar Gonzalez de Dios
2019 IEEE Transactions on Network and Service Management  
AV Resilience to Anti-detection Techniques For instance, Rastogi et al [69] perform a systematic evaluation of Android antimalware products by studying their detection abilities in the presence of anti-detection  ...  However, using ML, routing can be made more efficient, by dynamically tracking traffic loads and re-routing the most conflictive demands.  ... 
doi:10.1109/tnsm.2019.2927867 fatcat:or3lhqdqbnas3cztwkqr5ykhhq

A Survey : Data Mining and Machine Learning Methods for Cyber Security

Ashish Prajapati, Shital Gupta
2021 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Documents representing each method were categorized, read and summarized based on the number of citations and significance of an evolving method. Since data is so important.  ...  This survey paper describes the literature survey for cyber analytics in support of intrusion detection of machine learnings (ML) and data mining (DM) methods.  ...  However, this focus may neglect major new and evolving techniques, so some of these papers have also been selected.  ... 
doi:10.32628/cseit217212 fatcat:rz6kk2ywprbi3lf7gz7msm2zxa

SoK: Lessons Learned from Android Security Research for Appified Software Platforms

Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick McDaniel, Matthew Smith
2016 2016 IEEE Symposium on Security and Privacy (SP)  
Android security and privacy research has boomed in recent years, far outstripping investigations of other appified platforms.  ...  To put Android security and privacy research into context, we compare the concept of appification with conventional operating system and software ecosystems.  ...  ACKNOWLEDGEMENTS This work was supported by the German Federal Ministry for Education and Research (BMBF) through funding for the Center for IT-Security, Privacy and Accountability (CISPA) via the projects  ... 
doi:10.1109/sp.2016.33 dblp:conf/sp/Acar0BFM016 fatcat:xxyvxkbjp5biflq4nypse3byam

Android inter-app communication threats and detection techniques

Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mohamed Mosbah, Mauro Conti
2017 Computers & security  
Android malware authors use many anti-analysis techniques to hide from analysis tools.  ...  They are making use of the combinations of static, dynamic and behavior based analysis techniques.  ...  Dynamic Analysis This section briefly explains the proposed tools and techniques that conducts analysis dynamically.  ... 
doi:10.1016/j.cose.2017.07.002 fatcat:owzn5l7bvrcitix4mlfiabdhee

Cyber espionage through Botnets

Zsolt Bederna, Tamas Szadeczky
2019 Security Journal  
This history shows an evolution of the infection techniques, the scope of the target devices, and their usage.  ...  Thus, the new direction is the usage of sophisticated data leakage techniques by state-sponsored hacker groups. Our article analyses this evolution while focusing on Botnet usage for cyber espionage.  ...  Acknowledgements This article was supported by ERDF "CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence" (No. CZ.02.1.01/0.0/0.0/16_019/0000822).  ... 
doi:10.1057/s41284-019-00194-6 fatcat:irtf2ec2tjcidehkhvvn3rdmre

Responding to targeted stealthy attacks on Android using timely-captured memory dumps

Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio Hernandez-Castro
2022 IEEE Access  
Recent malware campaigns like Flubot demonstrate that by employing stealthy malware techniques even at minimal capacity, malware is highly effective in making its way to millions of devices with little  ...  The increasing dominance of Android smartphones for everyday communication and data processing makes long-term stealthy malware an even more dangerous threat.  ...  ACKNOWLEDGMENTS This work is supported by the LOCARD Project under Grant H2020-SU-SEC-2018-832735.  ... 
doi:10.1109/access.2022.3160531 fatcat:bl6bv6lspfdajnzxq22kxlo5gy

Google Android: A State-of-the-Art Review of Security Mechanisms [article]

A. Shabtai, Y. Elovici Department of Information Systems Engineering Ben-Gurion University Israel, Department of Computer Science Ben-Gurion University Israel, Deutsche Telekom Laboratories at Ben-Gurion University Israel)
2009 arXiv   pre-print
We conclude by proposing a set of security mechanisms that should be explored and introduced into Android-powered devices.  ...  The incorporation of integrated access services to the Internet on such mobile devices, however, increases their exposure to damages inflicted by various types of malware.  ...  Smartphone malware evolve very quickly due to the experience virus writers have gained from the computer and Internet world.  ... 
arXiv:0912.5101v1 fatcat:lco6bcdjfffvdjaopqf24jmz2u

SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents

Abdullah J. Alzahrani, Ali A. Ghorbani
2017 Journal of Cyber Security and Mobility  
Along with increasing security measures in Android platforms, the amount of Android malware that use remote exploits has grown significantly.  ...  Efficient detection and defence techniques that use filtering and blocking methods for SMS botnets is therefore an urgent necessity.  ...  The SMS botnet dataset collected botnet samples from the Android Genome Malware project [154] , malware security blog [36] , VirusTotal [140] , and samples provided by a well-known anti-malware vendor  ... 
doi:10.13052/jcsm2245-1439.523 fatcat:dkxeklymibgldpjr5fb6oebo3y
« Previous Showing results 1 — 15 out of 187 results