2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2015
DOI: 10.1109/icse.2015.235
|View full text |Cite
|
Sign up to set email alerts
|

Security Toolbox for Detecting Novel and Sophisticated Android Malware

Abstract: Abstract-This paper presents a demo of our Security Toolbox to detect novel malware in Android apps. This Toolbox is developed through our recent research project funded by the DARPA Automated Program Analysis for Cybersecurity (APAC) project. The adversarial challenge ("Red") teams in the DARPA APAC program are tasked with designing sophisticated malware to test the bounds of malware detection technology being developed by the research and development ("Blue") teams. Our research group, a Blue team in the DAR… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…ese features included permissions, APIs, and application components. Holland et al [26] and Quan et al [27] adopted pattern match algorithm and the mixed feature to detect malwares.…”
Section: 2mentioning
confidence: 99%
See 1 more Smart Citation
“…ese features included permissions, APIs, and application components. Holland et al [26] and Quan et al [27] adopted pattern match algorithm and the mixed feature to detect malwares.…”
Section: 2mentioning
confidence: 99%
“…In order to effectively detect Android malicious applications, various methods have been proposed. ese methods include the single-feature mechanisms [6][7][8][9][10][11][12][13][14][15][16][17] and the multifeatures fusion mechanisms [18][19][20][21][22][23][24][25][26]. e methods based on a single-feature mechanism usually train a classifier with one type of features which include APIs [8], permissions [6,7], call graphs, images [10], or codes [9,[13][14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%
“…DARPA used RTing to develop malware to exploit weaknesses in the Android operating system. The goal of the RT was to develop the most sophisticated malware while the blue-team had to find means of intrusion detection and provide defenses against intrusion (Holland, Deering and Kothari, 2015). In a RT/blue-team exercise the time required by each team for their tasks is a useful measure of the challenge to attack or defend the system (Rege et al, 2017).…”
Section: Red-teaming In Network Intrusion Testingmentioning
confidence: 99%
“…In this section, we provide the reader with background knowledge about the Atlas [50] program analysis platform. Atlas is a static program analysis platform for C, Java source code, and Java bytecode developed by EnSoft Corp, which can be used to develop custom and sophisticated software analyzers [80]. Before we describe our approach to summary generation, we briey describe the necessary infrastructure for developing FlowMiner that is provided by Atlas.…”
Section: Background: Atlas Program Analysis Platformmentioning
confidence: 99%