2014
DOI: 10.1016/j.cose.2014.02.009
|View full text |Cite
|
Sign up to set email alerts
|

Mobile malware detection through analysis of deviations in application network behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
95
0
1

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 154 publications
(100 citation statements)
references
References 11 publications
2
95
0
1
Order By: Relevance
“…The final decision is passed to the user interface module, which prepares appropriate message for the user and presents it through the graphical user interface, as shown in Figure 5. Such design of the decision maker sub-module ensures faster detection and higher performance, as it was adopted by Shabtai et al [37]. …”
Section: Decision Makermentioning
confidence: 99%
“…The final decision is passed to the user interface module, which prepares appropriate message for the user and presents it through the graphical user interface, as shown in Figure 5. Such design of the decision maker sub-module ensures faster detection and higher performance, as it was adopted by Shabtai et al [37]. …”
Section: Decision Makermentioning
confidence: 99%
“…However, current static techniques fail to identify malicious components when they are obfuscated or embedded separately from the code (e.g., hidden into an image) [22,12]. Approaches based on dynamic code analysis [11] are promising, but current works [6,21,23] only provide an holistic understanding of the behavior of an app. This feature challenges the identification of malware using steganography.…”
Section: Thwarting Malware In Smartphonesmentioning
confidence: 99%
“…By carrying out network packet analysis on the suspicious mobile apps [17], it was possible to obtain the external transaction of SSP malware. Based on it, we can perfectly proof the external activity of hidden evasive server-side polymorphic mobile malware more in detail after capturing packet as follow Figure 6.…”
Section: Evidence Aggregation On Dynamic Ssp Malware With Simulated Cmentioning
confidence: 99%
“…Furthermore, they are devised to perform different types of execution processes every time by applying an advanced mechanism, such as changing the execution sequence for internal codes of the mobile app through the use of random numbers selected arbitrarily. Therefore, when this function is applied, they show a characteristic of detecting avoidance through mobile anti-virus vaccines [10,11,16,17]. …”
Section: Detailed Mechanism Of Server-side Polymorphic Mobile Malwarementioning
confidence: 99%