The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2010 5th International Conference on Malicious and Unwanted Software 2010
DOI: 10.1109/malware.2010.5665792
|View full text |Cite
|
Sign up to set email alerts
|

An Android Application Sandbox system for suspicious software detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
163
0
2

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 336 publications
(172 citation statements)
references
References 14 publications
0
163
0
2
Order By: Relevance
“…Several works such as [6]- [12] apply static analysis for detection of Android malware. Grace et al proposed RiskRanker [6] for automated risk assessment and app profiling in order to police Android markets.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Several works such as [6]- [12] apply static analysis for detection of Android malware. Grace et al proposed RiskRanker [6] for automated risk assessment and app profiling in order to police Android markets.…”
Section: Related Workmentioning
confidence: 99%
“…AndroidLeaks [9], SCANDAL [10], and the approach presented in [11] are frameworks that detect privacy information leakage based on static analysis. Furthermore, in [12], the Android Application Sandbox (AAS) is proposed by Blasing et al AAS uses both static and dynamic analysis, where the static analysis part is based on matching 5 different patterns from decompiled code. Static analysis also provides the basis for the heuristic engine proposed in [2] for detecting Android malware using 39 different flags.…”
Section: Related Workmentioning
confidence: 99%
“…Sandboxing is the process of creating an isolated computer environment, typically through virtualisation, to test untrusted operations such as those observed in unverified and untested code or programs. It has been effectively implemented as a security solution in various fields of computing, from specific code platforms [Leroy 2001] to browser systems [Barth et al 2008], and in the field of smartphone security to improve defence against malicious software [Blasing et al 2010]. Proprietary applications, such as Adobe Acrobat X, have also implemented their own sandbox engine for enhanced security [Xiao and Zhao 2013].…”
Section: Technicalmentioning
confidence: 99%
“…Through taxonomic research and development, defence systems have employed techniques that analyse relationships between application behaviour and response (sandboxing [Blasing et al 2010;Greamo and A.Ghosh 2011], dynamic anomaly based scanning [Tavallaee et al 2010] etc.). These systems have enabled dynamic and proactive response to security threats on multiple technical platforms, from mobile to desktop operating systems.…”
Section: Introductionmentioning
confidence: 99%
“…The approach is based on a probabilistic diffusion scheme using device usage patterns [1]. The Android Application Sandbox [4] has also been used for both static and dynamic analysis on Android programs and for detecting suspicious applications automatically based on the collaborative detection [20]. This assumes that if the neighbours of a device are infected, the device itself is likely to be infected.…”
Section: General Mobile Malware Detection Techniquesmentioning
confidence: 99%