2021 28th IEEE International Conference on Electronics, Circuits, and Systems (ICECS) 2021
DOI: 10.1109/icecs53924.2021.9665597
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Applications' State via System Calls Activity: A Pipeline Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Therefore capturing and analyzing the system calls produced by applications will provide accurate information about the behavior of that application [22]. Further, in our previous research, we have successfully used system calls to determine whether an Android application is running in the foreground or background using a limited number of system calls as well as lightweight training [23]. For the aforementioned reason, our proposed solution is based on collecting system call traces to analyze app behaviour and train a machine learning model to be able to detect a malign (exfiltration) or benign process.…”
Section: Linux System Callsmentioning
confidence: 99%
“…Therefore capturing and analyzing the system calls produced by applications will provide accurate information about the behavior of that application [22]. Further, in our previous research, we have successfully used system calls to determine whether an Android application is running in the foreground or background using a limited number of system calls as well as lightweight training [23]. For the aforementioned reason, our proposed solution is based on collecting system call traces to analyze app behaviour and train a machine learning model to be able to detect a malign (exfiltration) or benign process.…”
Section: Linux System Callsmentioning
confidence: 99%
“…According to Kost [7,84,85,86,87], there are various ways large corporations like Meta could prevent possible…”
Section: B Monitoringmentioning
confidence: 99%