2017
DOI: 10.1007/978-3-319-60876-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Deep Ground Truth Analysis of Current Android Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
255
1
4

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 315 publications
(260 citation statements)
references
References 13 publications
0
255
1
4
Order By: Relevance
“…Let us use an example to demonstrate how Ripple can help in detecting malicious program behaviors in the presence of reflection and code obfuscation. Code obfuscation via reflection is a commonly used anti‐analysis technique . Ripple can be applied to infer the hidden targets accessed at reflective calls by exploiting the type information around so that the hidden malicious behaviors can be exposed.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Let us use an example to demonstrate how Ripple can help in detecting malicious program behaviors in the presence of reflection and code obfuscation. Code obfuscation via reflection is a commonly used anti‐analysis technique . Ripple can be applied to infer the hidden targets accessed at reflective calls by exploiting the type information around so that the hidden malicious behaviors can be exposed.…”
Section: Discussionmentioning
confidence: 99%
“…35 Ripple can be applied to infer the hidden targets accessed at reflective calls by exploiting the type information around so that the hidden malicious behaviors can be exposed. Figure 12 illustrates a code snippet adapted from an example discussed in, 35 which is taken from an Android malware, called Obad. 36 In the code shown, each "..." stands for some encrypted string generated by an obfuscation tool.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to investigate the presence of malicious and undesirable apps in our dataset, we uploaded all the apps to VirusTotal [31], an online analysis service that aggregates more than 60 anti-virus engines, which is widely adopted by the research community. Previous studies [40,96] have suggested that some anti-virus engines may not always report reliable results. In order to deal with such potential false positives, we analyzed the results grouped by how many engines (AV-rank) flag a sample as malware.…”
Section: Malware Prevalencementioning
confidence: 98%