2015
DOI: 10.1007/978-3-319-24177-7_18
|View full text |Cite
|
Sign up to set email alerts
|

Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments

Abstract: The need to accurately specify and detect malicious behavior is widely known. This paper presents a novel and convenient way of accurately specifying malicious behavior in mobile environments by taking Android as a representative platform of analysis and implementation. Our specification takes a sequence-based approach in declaratively formulating a malicious action, whereby any two consecutive securitysensitive operations are connected by either a control or taint flow. It also captures the invocation context… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Table 8 represents static, dynamic, and hybrid-based Android malware detection frameworks and their robustness against metamorphism evasion detection techniques. (a) Code Obfuscation Detection: Code obfuscation consists of CRE, CIN, and DCI; we explain each evasion detection framework in the following list: – CRE - Code Reordering Evasion Detection: ResDroid ( Shao et al, 2014 ), AnDarwin ( Crussell, Gibler & Chen, 2015 ), and Seqmalspec ( Sufatrio et al, 2015a ) proposed static analysis based detection and managed to detect CRE evasion. Likewise, Q-floid ( Castellanos et al, 2016 ) detected CRE using the dynamic sandboxing methodology.…”
Section: Evaluation Of Evasion Detection Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…Table 8 represents static, dynamic, and hybrid-based Android malware detection frameworks and their robustness against metamorphism evasion detection techniques. (a) Code Obfuscation Detection: Code obfuscation consists of CRE, CIN, and DCI; we explain each evasion detection framework in the following list: – CRE - Code Reordering Evasion Detection: ResDroid ( Shao et al, 2014 ), AnDarwin ( Crussell, Gibler & Chen, 2015 ), and Seqmalspec ( Sufatrio et al, 2015a ) proposed static analysis based detection and managed to detect CRE evasion. Likewise, Q-floid ( Castellanos et al, 2016 ) detected CRE using the dynamic sandboxing methodology.…”
Section: Evaluation Of Evasion Detection Frameworkmentioning
confidence: 99%
“…ResDroid ( Shao et al, 2014 ), AnDarwin ( Crussell, Gibler & Chen, 2015 ), and Seqmalspec ( Sufatrio et al, 2015a ) proposed static analysis based detection and managed to detect CRE evasion. Likewise, Q-floid ( Castellanos et al, 2016 ) detected CRE using the dynamic sandboxing methodology.…”
Section: Evaluation Of Evasion Detection Frameworkmentioning
confidence: 99%
See 1 more Smart Citation