Proceedings of the 13th International Conference on Availability, Reliability and Security 2018
DOI: 10.1145/3230833.3232828
|View full text |Cite
|
Sign up to set email alerts
|

Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…1) Malware analysis. For efficient and accurate malware detection, the authors in [33] investigated code reuse in legitimate and malicious mobile apps, and code similarity measurement techniques were improved in [34].…”
Section: Related Workmentioning
confidence: 99%
“…1) Malware analysis. For efficient and accurate malware detection, the authors in [33] investigated code reuse in legitimate and malicious mobile apps, and code similarity measurement techniques were improved in [34].…”
Section: Related Workmentioning
confidence: 99%
“…Kalysch et al [26] propose a technique based on the centroid of CFGs to measure the similarity between Android native codes. The centroid approach is faster than other approaches for matching CFGs.…”
Section: Related Workmentioning
confidence: 99%
“…Disassembling native code to an intermediate code (e.g., a CFG or MAIL) is a non-trivial problem. The work presented in [26] processes only native code libraries and not native code applications. Moreover, they cannot process Intel x86 and 64 bit ARM native code, because of the limitations of the tools used for disassembling.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation