2012
DOI: 10.1007/s12083-012-0179-x
|View full text |Cite
|
Sign up to set email alerts
|

Exposing mobile malware from the inside (or what is your mobile app really doing?)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
6
2
1

Relationship

3
6

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…those that generate considerable network traffic. • iOS Detection approaches, such as the work proposed by Damopoulos et al [30], [31], produce high accuracy results, however these approaches require jailbreaking [40], which could put the device at risk and make the end-user reluctant to employ it. • Hanlin et al [36] use sandboxing to safely analyze malware behavior.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…those that generate considerable network traffic. • iOS Detection approaches, such as the work proposed by Damopoulos et al [30], [31], produce high accuracy results, however these approaches require jailbreaking [40], which could put the device at risk and make the end-user reluctant to employ it. • Hanlin et al [36] use sandboxing to safely analyze malware behavior.…”
Section: Discussionmentioning
confidence: 99%
“…Damopoulos et al [30] proposed a tool which dynamically analyzes iOS apps in terms of method invocation. The authors designed and implemented an automated malware analyzer and detector for the iOS platform, namely iDMA.…”
Section: Anomaly-based Detectionmentioning
confidence: 99%
“…Specifically, we cross-evaluate four supervised machine learning algorithms, i.e., Bayesian Networks, Radial Basis function (RBF), K-Nearest Neighbor (KNN) and Random Forest [41]. The data analysis was carried out using Weka.…”
Section: System Evaluationmentioning
confidence: 99%
“…The First effort to recognize and examine the malware on the mobile phones introduced by existing PC Security Solution but this was not the reasonable solution Schmidt is one the person who suggested mobile malware detection for Android Smartphone [14] . This proposed algorithm derive function calls from binaries of application and for detecting unrevealed malware a clustering mechanism called Centroid is used .Which is achieved by implementing static analysis of Executable and Linking Format(ELF) objects files by utilizing command readelf in Android.…”
Section: Related Studies On Mobile Malware Detectionmentioning
confidence: 99%