2016
DOI: 10.1155/2016/8034967
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Visualization of Android Malware Behavior

Abstract: Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code. The increasing number of malicious applications targeting Android devices raises the demand for analyzing them to find where the malcode is triggered when user interacts with them. In this paper a framework to monitor and visualize Android applications’ anomalous function calls is described. Our approach includes platform-inde… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(24 citation statements)
references
References 15 publications
0
24
0
Order By: Relevance
“…There is no doubt about having many types of malware as confirmed by many PSs [50]. In addition, malware families may shows diverse actions in their lifetime extend from sheer upsetting to highly malicious.…”
Section: Malware Typesmentioning
confidence: 99%
“…There is no doubt about having many types of malware as confirmed by many PSs [50]. In addition, malware families may shows diverse actions in their lifetime extend from sheer upsetting to highly malicious.…”
Section: Malware Typesmentioning
confidence: 99%
“…In this case, entropic techniques are very useful [24]. (ii) Dynamic analysis, instead, relies on the execution of the applications [25,26]. e main idea is to collect (at runtime) the values that gradually come out from the called instructions.…”
Section: Different Approaches To Analyze Applicationsmentioning
confidence: 99%
“…Static detection framework is beneficial in efficiency, granularity, layers, as well as correctness [23]. Sandbox an emulator records and analyzes the app's behavior used to modify the short message (SM) sending function of the emulator, in order to record the SM content and receiver when the function is performed [24].…”
Section: Static Analysismentioning
confidence: 99%