2017
DOI: 10.1049/cje.2017.07.001
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Loading Vulnerability Detection for Android Applications Through Ensemble Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 13 publications
(24 reference statements)
0
5
0
Order By: Relevance
“…S. Poeplau [6] used a control flow graph constructed by the API method to detect applications that have used the dynamic loading mechanism, but the detection accuracy is not satisfactory. W. Yang [19] established the detector by extracting the context related to security-sensitive events. It defines two key elements of the context: the activation condition of the event and the environment attribute of the event.…”
Section: Static Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…S. Poeplau [6] used a control flow graph constructed by the API method to detect applications that have used the dynamic loading mechanism, but the detection accuracy is not satisfactory. W. Yang [19] established the detector by extracting the context related to security-sensitive events. It defines two key elements of the context: the activation condition of the event and the environment attribute of the event.…”
Section: Static Analysismentioning
confidence: 99%
“…It defines two key elements of the context: the activation condition of the event and the environment attribute of the event. W. Yang [ 20 ] found that 37.8% of 4464 test samples used dynamic loading technology by determining the location of the loading point. They proposed a static analysis method combining permissions and API features to complete this type of Malware identification.…”
Section: Related Workmentioning
confidence: 99%
“…The experiments showed that the anomaly detection with dynamic analysis was capable of detecting zero-day malware with 1.16% FNR and 1.30% FPR. Yang et al [215] proposed a detection method based on Ensemble Learning. They extracted the dynamic loading feature based on static analysis, and then adopted the well-constructed multi-label ensemble learning algorithm to conduct experiments.…”
Section: ) Loading Codementioning
confidence: 99%
“…This kind of vulnerability is caused by the incomplete security verification mechanism of Apps developers. Yang et al [10] used a combination of static and dynamic methods to analyze the App's dynamic loading vulnerability. This kind of vulnerability is caused by the insecure verification on the loaded executable file.…”
Section: Related Workmentioning
confidence: 99%
“…The security issues of Apps are complex and challenging. Related research on Android security has been proposed, including static [1]- [8] and dynamic [9], [10] methods. Wei et al [11] just analyzed Android vulnerabilities which are assosiated with JavaScript.…”
Section: Introductionmentioning
confidence: 99%