Proceedings of the 33rd Annual Computer Security Applications Conference 2017
DOI: 10.1145/3134600.3134601
|View full text |Cite
|
Sign up to set email alerts
|

Droid-AntiRM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…Similar to HiSenDroid, another line of work attempts to detect unknown types of trigger-based behaviors [57], [69]. A prominent example is HSOMiner [57], which extracts static characteristics of hidden behaviors as features and trains a machine learning model to identify the code blocks that observe similar patterns.…”
Section: Related Workmentioning
confidence: 99%
“…Similar to HiSenDroid, another line of work attempts to detect unknown types of trigger-based behaviors [57], [69]. A prominent example is HSOMiner [57], which extracts static characteristics of hidden behaviors as features and trains a machine learning model to identify the code blocks that observe similar patterns.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, Droid-AntiRM [40] aims to support dynamic analysis techniques by taming the anti-analysis techniques such as logic bomb section 5.6. Droid-AntiRMtr identifies those anti-analysis techniques and rewrites the condition statements in the App code to force the malicious behavior to be executed at analysis time, improving the performance of other dynamic analysis tools.…”
Section: Dynamic Analysismentioning
confidence: 99%
“…Input Generation. Several works [6,4,15,24,1,40,45,37] aim at generating user inputs that can lead to the execution of specific functions. Systems based on static analysis allow for faster code coverage, but they can lack precision.…”
Section: Background and Related Workmentioning
confidence: 99%