2013
DOI: 10.1109/tst.2013.6574680
|View full text |Cite
|
Sign up to set email alerts
|

MobSafe: cloud computing based forensic analysis for massive mobile applications using data mining

Abstract: With the explosive increase in Mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Internet, the apps replace the PC client software as the major target of malicious usage. In this paper, to improve the security status of current mobile apps, we propose a methodology to evaluate mobile apps based on Cloud Computing platform and data mining. We also present a prototype system named Mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…Note that both a benign and a malicious app may require the same permissions and are thus indistinguishable via this permission-based mechanism. In general, permission-based approaches are developed primarily for risk assessment [7][8][9][10] rather than malware detection.…”
Section: Introductionmentioning
confidence: 99%
“…Note that both a benign and a malicious app may require the same permissions and are thus indistinguishable via this permission-based mechanism. In general, permission-based approaches are developed primarily for risk assessment [7][8][9][10] rather than malware detection.…”
Section: Introductionmentioning
confidence: 99%
“…While Jianlin Xu [19] created a framework named MobSafe. The target of this framework is to distinguish and quantifythe portable application that is benevolent.…”
Section: Comparative Study On Existing Workmentioning
confidence: 99%
“…Hadoop is widely used in applicat ions where large scale data processing is necessary. Customer feedback analysis [36], social med ia analysis [38], ad-targeting [39], data warehouse modernization [34], operation analysis [35], fraud detection [37]…”
Section: Background and Literature Reviewmentioning
confidence: 99%