2020
DOI: 10.1016/j.infsof.2020.106291
|View full text |Cite
|
Sign up to set email alerts
|

A study of run-time behavioral evolution of benign versus malicious apps in android

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 47 publications
(24 citation statements)
references
References 8 publications
0
24
0
Order By: Relevance
“…We have developed a toolkit for systematic app characterization [19,20]. Using this toolkit, we sampled at least 1,000 benign apps and malware from each of eight past years, and characterized their behavioral evolution in terms of the proposed structure metrics on code layer interaction in the instance view [15]. Figure 2 depicts part of the results from this preliminary study, which revealed several interesting patterns of app evolution.…”
Section: Current Results and Next Stepsmentioning
confidence: 99%
“…We have developed a toolkit for systematic app characterization [19,20]. Using this toolkit, we sampled at least 1,000 benign apps and malware from each of eight past years, and characterized their behavioral evolution in terms of the proposed structure metrics on code layer interaction in the instance view [15]. Figure 2 depicts part of the results from this preliminary study, which revealed several interesting patterns of app evolution.…”
Section: Current Results and Next Stepsmentioning
confidence: 99%
“…The source code of the smart contract is in unstructured form; thus, we need to learn the structure features of the smart contract code for better Ponzi scheme contract detection [ 48 , 49 , 50 ]. Therefore, instead of using the plain source code directly as the input of the model, we parse the source code into an Abstract Syntax Tree (AST) according to the ANTLR [ 51 ] syntax rules and then generate a Structure-Based Traversal (SBT) sequence from the AST using the SBT method [ 12 ].…”
Section: Smart Ponzi Scheme Detection Modelmentioning
confidence: 99%
“…MiM attacks rely on intercepting messages and transmitting information, sniffing private information in the process [19]. The attacker can provide a malicious app similar to the real one, as indicated in the literature for many other domains [20]. When users have this malicious app installed on their devices, they can properly use all the app functionalities, but this app would steal the authentication information to give attackers access to all kinds of private information.…”
Section: E Potential Attacks On Iot Smart Furniturementioning
confidence: 99%