Proceedings of the 3rd ACM on International Workshop on Security and Privacy Analytics 2017
DOI: 10.1145/3041008.3041010
|View full text |Cite
|
Sign up to set email alerts
|

EMULATOR vs REAL PHONE

Abstract: The Android operating system has become the most popular operating system for smartphones and tablets leading to a rapid rise in malware. Sophisticated Android malware employ detection avoidance techniques in order to hide their malicious activities from analysis tools. These include a wide range of anti-emulator techniques, where the malware programs attempt to hide their malicious activities by detecting the emulator. For this reason, countermeasures against antiemulation are becoming increasingly important … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 65 publications
(18 citation statements)
references
References 18 publications
0
18
0
Order By: Relevance
“…Random Forest are an outfit learning strategy for grouping, relapse and different errands that works by building a large number of choice trees at preparing time and yielding the class that is the method of the classes or mean expectation of the individual trees [4] . Irregular choice timberlands right for choice trees' propensity for overfitting to their preparation set.…”
Section: Randomforestmentioning
confidence: 99%
“…Random Forest are an outfit learning strategy for grouping, relapse and different errands that works by building a large number of choice trees at preparing time and yielding the class that is the method of the classes or mean expectation of the individual trees [4] . Irregular choice timberlands right for choice trees' propensity for overfitting to their preparation set.…”
Section: Randomforestmentioning
confidence: 99%
“…Other papers utilize tools such as Droidbox [13] or Dynalog [14] to extract dynamic features [15] for training machine learning based classifiers. Papers [16]- [21] also present dynamic analysis-based work for Android malware detection, while [22], [23], [31] and [32] use both static and dynamic features.…”
Section: Related Workmentioning
confidence: 99%
“…Android malware analysis such as SandDroid [19], CopperDroid [15], TraceDroid [20], and NVISO ApkScan [21]. These dynamic approaches can again be discarded on the assumption that they are running on an emulator or virtualized environment [22].…”
Section: Flaws In Current Emulator Scanning Processmentioning
confidence: 99%
“…Feature extraction was performed on two different environments, emulator and real phone. After each application is executed, the emulator is restored which ensures the removal of all third party apps [22].…”
Section: Environmental Setup For Feature Extractionmentioning
confidence: 99%
See 1 more Smart Citation