Detecting And Characterizing Self Hiding Behavior In Android Applications


Download Detecting And Characterizing Self Hiding Behavior In Android Applications PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Detecting And Characterizing Self Hiding Behavior In Android Applications book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Detecting and Characterizing Self Hiding Behavior in Android Applications


Detecting and Characterizing Self Hiding Behavior in Android Applications

Author: Raina Samuel

language: en

Publisher:

Release Date: 2018


DOWNLOAD





Applications (apps) that conceal their activities are fundamentally deceptive; app marketplaces and end-users should treat such apps as suspicious. However, due to its nature and intent, activity concealing is not disclosed up-front, which puts users at risk. This study focuses on characterization and detection of such techniques, e.g., hiding the app or removing traces, known as 'self hiding' (SH) behavior. SH behavior has not been studied per se - rather it has been reported on only as a byproduct of malware investigations. This gap is addressed via a study and suite of static analyses targeted at SH in Android apps.

Intelligent Mobile Malware Detection


Intelligent Mobile Malware Detection

Author: Tony Thomas

language: en

Publisher: CRC Press

Release Date: 2022-12-30


DOWNLOAD





The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The text then presents four different system call-based dynamic Android malware detection mechanisms using graph centrality measures, graph signal processing and graph convolutional networks. Further, the text shows how most of the Android malware can be detected by checking the presence of a unique subsequence of system calls in its system call sequence. All the malware detection mechanisms presented in the book are based on the authors' recent research. The experiments are conducted with the latest Android malware samples, and the malware samples are collected from public repositories. The source codes are also provided for easy implementation of the mechanisms. This book will be highly useful to Android malware researchers, developers, students and cyber security professionals to explore and build defense mechanisms against the ever-evolving Android malware.

Intrusion Detection and Prevention for Mobile Ecosystems


Intrusion Detection and Prevention for Mobile Ecosystems

Author: Georgios Kambourakis

language: en

Publisher: CRC Press

Release Date: 2017-09-06


DOWNLOAD





This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection and prevention for the mobile ecosystem. It also includes surveys, simulations, practical results and case studies.