2015 International Carnahan Conference on Security Technology (ICCST) 2015
DOI: 10.1109/ccst.2015.7389671
|View full text |Cite
|
Sign up to set email alerts
|

A study of android malware detection technology evolution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Various static techniques exist, such as signature-based analysis, permission-based analysis, or component-based analysis. Regarding our proposal, component-based techniques are of particular interest, involving decompiling the entire app to inspect bytecode and significant components to identify pos-sible vulnerabilities [42,43]. Although these techniques often yield good results, the main challenge is the lack of real execution paths and suitable execution conditions.…”
Section: Related Workmentioning
confidence: 99%
“…Various static techniques exist, such as signature-based analysis, permission-based analysis, or component-based analysis. Regarding our proposal, component-based techniques are of particular interest, involving decompiling the entire app to inspect bytecode and significant components to identify pos-sible vulnerabilities [42,43]. Although these techniques often yield good results, the main challenge is the lack of real execution paths and suitable execution conditions.…”
Section: Related Workmentioning
confidence: 99%
“…In the following trigger of “init()” event of the main application, the malicious payload is invoked using the “DexClassLoader” class. Due to the unavailability of the dynamically loaded code during Android malware static analysis, the DCL and DCM evasion technique is another transformation technique that is a big challenge for static analysis ( Hsieh, Wu & Kao, 2016 ; Li et al, 2016 ). Although some researchers ( Poeplau et al, 2014 ; Zhang, Luo & Yin, 2015 ; Zhauniarovich et al, 2015 ) studied how DCL evades malware detection, it is still an open issue that needs more attention.…”
Section: Evasion Techniquesmentioning
confidence: 99%
“…In incident response, the time between initial identification and containment is critical to reducing damage particularly when sensitive or high-risk data is involved [1]. This is particularly true with modern malware moving to mobile devices and evolving to include theft of messages, position data, and banking credentials, all with real-time attacker command and control [2].…”
Section: Introductionmentioning
confidence: 99%