2010
DOI: 10.1007/978-3-642-12368-9_3
|View full text |Cite
|
Sign up to set email alerts
|

A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones

Abstract: Abstract. Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given the battery, computing power, and bandwidth limitations inherent to such mobile devices, detection of malware on them is a research challenge that requires a different approach than the ones used for desktop/laptop computing. We present a novel probabilistic diffusion scheme for detecting anomalies possibly indicating malwa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…The approach in [2] includes a static analysis system for analysing Android market applications and uses automated reverse engineering and refactoring of binary application packages to mitigate security and privacy threats driven by security preferences of the user. The approach is based on a probabilistic diffusion scheme using device usage patterns [1]. The Android Application Sandbox [4] has also been used for both static and dynamic analysis on Android programs and for detecting suspicious applications automatically based on the collaborative detection [20].…”
Section: General Mobile Malware Detection Techniquesmentioning
confidence: 99%
“…The approach in [2] includes a static analysis system for analysing Android market applications and uses automated reverse engineering and refactoring of binary application packages to mitigate security and privacy threats driven by security preferences of the user. The approach is based on a probabilistic diffusion scheme using device usage patterns [1]. The Android Application Sandbox [4] has also been used for both static and dynamic analysis on Android programs and for detecting suspicious applications automatically based on the collaborative detection [20].…”
Section: General Mobile Malware Detection Techniquesmentioning
confidence: 99%
“…Alpcan et al proposed the use of a "novel probabilistic diffusion scheme for detecting anomalies possibly indicating malware which is based on device usage patterns" [27]. Behl and Behl [26] recommend solutions to protect end-users from the potential privacy and security vulnerabilities of cloud systems.…”
Section: Other Privacy Frameworkmentioning
confidence: 99%
“…Despite the fact that all the aforementioned researches have significantly contributed to the anomaly‐based IDS for mobile devices issued, several important problems remain unsolved. Currently, the main disadvantage of most IDS for mobile devices that use anomaly detection techniques is the high false alarm rate (FPR) . Hence, there is an urgent need for methods that substantially improve the detection rate while minimising false alarms.…”
Section: Related Workmentioning
confidence: 99%