ABSTRACT
A recent study shows that more than 50% of mobile devices running Google's Android mobile operating system (OS) have unpatched vulnerabilities, opening them up to malicious applications and malware attacks. The starting point of becoming a potential victim due to malware is to allow the installation of applications without knowing in advance the operations that an application can perform. In particular, many recent reports suggest that malware applications caused unwanted billing by sending SMS messages to premium numbers without the knowledge of the victim [1, 2]. Given that, there is a need for techniques to identify malicious behaviors of applications before installing them.
- A. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A Survey of Mobile Malware in the Wild," Proc. of the ACM Workshop Security and Privacy in Mobile Devices (SPMD), 2011, pp. 3--14. Google ScholarDigital Library
- C. Baldwin, Android Applications Vulnerable to Security, http://www.computerweekly.com/news/2240163351/Android-devices-vulnerable-to-security-breaches, Sept 2012.Google Scholar
- P. Vinod, J. Rajasthan, V. Laxmi, and M. S. Gaur. "Survey on Malware Detection Methods", Proceedings of IIT Kanpur Hackers' Workshop (IITKHACK), pp. 74--79, March 2009.Google Scholar
- T. Cover and J. Thomas, Elements of Information Theory, John Wiley and Sons, 2006. Google ScholarDigital Library
- R. T. Fernández, The effect of smoothing in language models for novelty detection, Proceedings of the 1st BCS IRSG conference on Future Directions in Information Access, August 28--29, 2007, Glasgow, Scotland. Google ScholarDigital Library
Index Terms
- Student research abstract: android malware detection based on Kullback-Leibler divergence
Recommendations
Botnet Research Survey
COMPSAC '08: Proceedings of the 2008 32nd Annual IEEE International Computer Software and Applications ConferenceBotnets are emerging threat with hundreds of millions of computers infected. A study shows that about 40% of all computers connected to the internet in the world are infected bots and controlled by attackers. This article isa survey of recent advances ...
Research: Model for network behaviour under viral attack
Computer viruses, worms and Trojan horses pose the most severe intrusion threat against an automated environment, especially if this environment is distributed and the ability to enforce physical access control is very limited. These structures are also ...
Unveiling metamorphism by abstract interpretation of code properties
Metamorphic code includes self-modifying semantics-preserving transformations to exploit code diversification. The impact of metamorphism is growing in security and code protection technologies, both for preventing malicious host attacks, e.g., in ...
Comments