2015 IEEE Trustcom/BigDataSE/Ispa 2015
DOI: 10.1109/trustcom.2015.377
|View full text |Cite
|
Sign up to set email alerts
|

Fast Identification of Obfuscation and Mobile Advertising in Mobile Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…The second category is metamorphism, which mutates the application code, but maintains the same behaviour. Malware authors employ obfuscation tools, such as Obfuscapk ( Aonzo et al, 2020 ), ProGuard ( Lafortune, 2002 ), DashO ( Wang et al, 2016 ), KlassMaster ( Kuhnel, Smieschek & Meyer, 2015 ), and JavaGuard ( Sihag, Vardhan & Singh, 2021a ) to encrypt their code and decrypt during runtime; they modify the code itself to evade the heuristic detection and signature analysis of the malware detection techniques.…”
Section: Evasion Techniquesmentioning
confidence: 99%
See 4 more Smart Citations
“…The second category is metamorphism, which mutates the application code, but maintains the same behaviour. Malware authors employ obfuscation tools, such as Obfuscapk ( Aonzo et al, 2020 ), ProGuard ( Lafortune, 2002 ), DashO ( Wang et al, 2016 ), KlassMaster ( Kuhnel, Smieschek & Meyer, 2015 ), and JavaGuard ( Sihag, Vardhan & Singh, 2021a ) to encrypt their code and decrypt during runtime; they modify the code itself to evade the heuristic detection and signature analysis of the malware detection techniques.…”
Section: Evasion Techniquesmentioning
confidence: 99%
“…This paper refers to Data Encryption as DEN, Bytecode Encryption as BEN, and Payload Encryption as PEN. This paper examines the following types of evasions: Data Encryption (DEN): This evasion technique tends to encrypt specific data vital for the malicious action and decrypt the encrypted data later, which modifies the malware application characteristics to evade the detection techniques ( Kuhnel, Smieschek & Meyer, 2015 ). The data refers to strings or network addresses embedded in the code.…”
Section: Evasion Techniquesmentioning
confidence: 99%
See 3 more Smart Citations