2018
DOI: 10.1109/access.2018.2805783
|View full text |Cite
|
Sign up to set email alerts
|

Consortium Blockchain-Based Malware Detection in Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
59
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 151 publications
(68 citation statements)
references
References 26 publications
0
59
0
Order By: Relevance
“…In the Internet of Things devices, attackers seek to exfiltrate the data of IoT devices by using the malicious codes in malware, especially on the open source Android platform. By utilizing statistical analysis method, Gu et al [46] introduced a malware detection system based on the consortium Blockchain, named CB-MDEE, which is composed of detecting consortium chain by test members and public chain by users. The CB-MDEE system adopts a fuzzy comparison method and multiple marking functions In order to reduce the false-positive rate and improve the detection ability of malware variants.…”
Section: E Internet Of Things Devicesmentioning
confidence: 99%
“…In the Internet of Things devices, attackers seek to exfiltrate the data of IoT devices by using the malicious codes in malware, especially on the open source Android platform. By utilizing statistical analysis method, Gu et al [46] introduced a malware detection system based on the consortium Blockchain, named CB-MDEE, which is composed of detecting consortium chain by test members and public chain by users. The CB-MDEE system adopts a fuzzy comparison method and multiple marking functions In order to reduce the false-positive rate and improve the detection ability of malware variants.…”
Section: E Internet Of Things Devicesmentioning
confidence: 99%
“…However, the success of the proposed approach depends on the knowledge of the operations. According to which, the network governing equations can be calculated based on two frequencies, f 1 and f 2 , of vehicle slots for operations defined in (1). Considering that the vehicles operate in a Gaussian mode, the two frequencies for network and blockchain operations can be given as…”
Section: Global Authentication Ch Selection To Allow Necessary Connecmentioning
confidence: 99%
“…Blockchain enables shared access to information which is broadcasted across a network based on the trust of its participants [1]. Industries aiming at services for the Internet of Vehicles (IoV) consider blockchain as a leading technology for handling managerial as well as transmission aspects of vehicles [2].…”
Section: Introductionmentioning
confidence: 99%
“…To obtain microcode update, a device sends its request using a blockchain on a peer‐to‐peer decentralized manner. Gu et al proposed “CB‐MDEE,” which is a framework based on blockchain; it is used to detect malware in mobile devices. The framework is based on fuzzy logic in the purpose to mitigate the false‐positive ratio and improve the detection of malware.…”
Section: Related Workmentioning
confidence: 99%