2015 17th International Conference on Advanced Communication Technology (ICACT) 2015
DOI: 10.1109/icact.2015.7224777
|View full text |Cite
|
Sign up to set email alerts
|

DroidExec: Root exploit malware recognition against wide variability via folding redundant function-relation graph

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 23 publications
0
11
0
Order By: Relevance
“…Except using Permission and API calls as features for malware detection, some researchers also used function-call relationships in static malware analysis. Wei et al [12] used function-relation graphs to measure the structural similarity of Apps and used DroidExec to recognize malwares. Gascon et al [13] generated the embedded function call graph and proved the effectiveness of this method in malware detection.…”
Section: Relative Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Except using Permission and API calls as features for malware detection, some researchers also used function-call relationships in static malware analysis. Wei et al [12] used function-relation graphs to measure the structural similarity of Apps and used DroidExec to recognize malwares. Gascon et al [13] generated the embedded function call graph and proved the effectiveness of this method in malware detection.…”
Section: Relative Workmentioning
confidence: 99%
“…A new Android malware-detecting scheme is proposed by this paper. Compared with some existing traditional methods which only apply unified processing for each App (e.g., [8] only can be used for Apps without obfuscation strategy and [12,13] only use complex call graph data for analysis), our scheme could provide more comprehensive analysis for any Android Apps. Besides, as our scheme provide some new detecting techniques and different processing methods are chosen according to the properties of each App, the analyzing efficiency is also enhanced.…”
Section: Relative Workmentioning
confidence: 99%
“…Nowadays, smartphones are playing an important role in our lives by providing rich functionalities that allow users to perform different activities such as playing games, browsing the Internet, using navigation services, doing online shopping, and checking the bank balance [1][2][3][4]. A smartphone is equipped with an operating system such as Android, BlackBerry, iOS, and Windows Mobile, while among these operating systems, Android is the fastest growing one [3,[5][6][7][8]. Due to the popularity of Android smartphones, Android applications (in short, apps) are also rapidly growing in the number and variety distributed via app stores such as the official Google Play Store (http://play.google.com/apps), Amazon App Store (https://www.amazon.com), and APKPure (https://apkpure.com) [4,[9][10][11].…”
Section: Introductionmentioning
confidence: 99%
“…However, this mechanism may produce false alarm, as the rooting attack features it identified is too broad. DroidExec is a root exploit malware recognition by feature matching based on similarity calculation [11]. The recognition rate relies on decompile technology and the predefined features.…”
Section: Related Workmentioning
confidence: 99%
“…Return-Oriented Programming (ROP) [4][5][6][7][8][9]. Some researchers suggested static detection methods to recognize privilege escalation attack [10,11], but they all rely on the source code and predefined features. There are some other dynamical approaches to defeat privilege escalation attack, such as PREC, RGBDroid and Security Identifier Randomization [12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%