2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 2015
DOI: 10.1109/icitst.2015.7412132
|View full text |Cite
|
Sign up to set email alerts
|

Detecting intelligent malware on dynamic Android analysis environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…A mobile cloud-based architecture was used to perform real-time detection efficiently [32]. In a study by Singh et al, a framework for the identification of malicious applications is presented [33]. The intent of this framework is to imitate artificial user behavior and analyze the real behavior of malicious software [33].…”
Section: Hybrid Analysis Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…A mobile cloud-based architecture was used to perform real-time detection efficiently [32]. In a study by Singh et al, a framework for the identification of malicious applications is presented [33]. The intent of this framework is to imitate artificial user behavior and analyze the real behavior of malicious software [33].…”
Section: Hybrid Analysis Methodsmentioning
confidence: 99%
“…In a study by Singh et al, a framework for the identification of malicious applications is presented [33]. The intent of this framework is to imitate artificial user behavior and analyze the real behavior of malicious software [33]. In the study of Wang et al, a static analysis technique was used to obtain permission usage information from API calls [34].…”
Section: Hybrid Analysis Methodsmentioning
confidence: 99%
“…Dietzel et al [243] offered a false responder agent that provides misleading values to the malware regarding the execution environment. Singh [179] used the detection of user interactions and anti-emulators to enhance the resilience of identifying dynamic malware [244]. Petsas et al [115] suggested several countermeasures for different types of evasion detection, such as anti-emulation employing IMEI alteration and precise sensor simulation.…”
Section: (A)mentioning
confidence: 99%
“…Scientists studied the possibility of detecting the running environment fingerprints to differentiate between an emulator and a physical device ( Jing et al, 2014 ; Maier, Muller & Protsenko, 2014 ; Maier, Protsenko & Müller, 2015 ; Vidas & Christin, 2014 ). Android.obad ( Faruki et al, 2015b ; Singh, Mishra & Singh, 2015 ) is an emulator-aware malware, which complicates the analysis process. The malware looks for the “Android.os.build.MODEL” value throughout the code and exits if it matches the emulator’s model.…”
Section: Evasion Techniquesmentioning
confidence: 99%
“…Singh ( Singh, Mishra & Singh, 2015 ) enhances the dynamic malware detection robustness, using anti-emulator and user interaction detection. Petsas ( Petsas et al, 2014 ) proposes countermeasures for different evasion detections, such as anti-emulation using realistic sensor simulation and IMEI modification.…”
Section: Evaluation Of Evasion Detection Frameworkmentioning
confidence: 99%