2021
DOI: 10.1016/j.jpdc.2021.05.004
|View full text |Cite
|
Sign up to set email alerts
|

SMS Observer: A dynamic mechanism to analyze the behavior of SMS-based malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Dynamic analysis involves executing malware samples in a controlled environment to observe their behavior during runtime. An effective method used to investigate malware is by analyzing the program's behavior during execution [16], [17]. This approach, also known as behavioral analysis, involves observing and collecting information from the operating system including API call sequence analysis, system call monitoring, network traffic analysis, sandboxing, and memory behavior analysis.…”
Section: B Dynamic Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Dynamic analysis involves executing malware samples in a controlled environment to observe their behavior during runtime. An effective method used to investigate malware is by analyzing the program's behavior during execution [16], [17]. This approach, also known as behavioral analysis, involves observing and collecting information from the operating system including API call sequence analysis, system call monitoring, network traffic analysis, sandboxing, and memory behavior analysis.…”
Section: B Dynamic Analysismentioning
confidence: 99%
“…Trainable parameters represent the bulkiness of the architecture. True Positive Rate (TPR) measures the proportion of positive instances correctly classified as positive by a model, presented in equation (17). While False Positive Rate (FPR) quantifies the ratio of negative instances incorrectly classified as positive given in equation (18).…”
Section: B Evaluation Metricsmentioning
confidence: 99%
“…where We chose two images which a SSIM value between 0.6 and 0.7, then combined the two malware images with an 8:2 ratio to generate a new image as a variant. The combined image of images x and y is calculated as Equation (5).…”
Section: Ssim(x Y)mentioning
confidence: 99%
“…Key features including permissions, intent, API calls, and system calls are collected to train classifiers to generate models for identifying samples in the test dataset 4 . Some approaches, such as dynamic analysis 5 and static analysis, 6 are frequently used to extract the features of malware. However, dynamic analysis needs to execute the malware in the virtual environment to obtain the behaviors of malware so that it may take lots of time and resources 7 .…”
Section: Introductionmentioning
confidence: 99%
“…For that, the proposed solution used here is to command the operation mode of the device with SMS messages to make the device in wake up/sleep mode. In this case, to manage the sleep mode using SMS messaging, we based on Nexmo REST API getaway [27]. This one allows us to send and receive text messages to users around the globe through simple RESTful APIs.…”
mentioning
confidence: 99%