2017
DOI: 10.1007/978-981-10-6898-0_20
|View full text |Cite
|
Sign up to set email alerts
|

Kernel Modification APT Attack Detection in Android

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…A study [144] proposed a method that detects APTs by analyzing control flow of the binary code of the kernel. The control flow analysis compares the genuine kernel's control flow graph with the device kernel's control flow graph.…”
Section: Smartphone Apt Detection Mechanismsmentioning
confidence: 99%
“…A study [144] proposed a method that detects APTs by analyzing control flow of the binary code of the kernel. The control flow analysis compares the genuine kernel's control flow graph with the device kernel's control flow graph.…”
Section: Smartphone Apt Detection Mechanismsmentioning
confidence: 99%
“…Remote-assisted Malware Detection. Kernel-based malware detection is commonly used to protect enterprises and users' application [30], [31]. User applications generally call kernel-based functions when executing, thus, kernel function based monitoring (e.g., system call interposition) can verify the runtime application.…”
Section: Related Workmentioning
confidence: 99%