2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS) 2018
DOI: 10.1109/padsw.2018.8644924
|View full text |Cite
|
Sign up to set email alerts
|

Towards Privacy-Preserving Malware Detection Systems for Android

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…Works in this category either process the encrypted network traffic using software-based cryptographic techniques, such as searchable encryption, or process the network traffic inside encrypted memory regions in order to ensure the preservation of privacy. With searchable encryption, tools are able to search directly on encrypted data without decrypting it, and thus, without leaking information in plaintext (e.g., for privacy preserving malware detection [56]). This is achieved by encrypting the rules to be searched against the already encrypted traffic (e.g., [41]).…”
Section: Techniquesmentioning
confidence: 99%
“…Works in this category either process the encrypted network traffic using software-based cryptographic techniques, such as searchable encryption, or process the network traffic inside encrypted memory regions in order to ensure the preservation of privacy. With searchable encryption, tools are able to search directly on encrypted data without decrypting it, and thus, without leaking information in plaintext (e.g., for privacy preserving malware detection [56]). This is achieved by encrypting the rules to be searched against the already encrypted traffic (e.g., [41]).…”
Section: Techniquesmentioning
confidence: 99%
“…Multi-layer perceptron's were found to work best with 99.4 percent accuracy, their project was designed to test Android malware classification algorithms [5]. A security detection approach based on the Metropolis algorithm is proposed in their article on Android introduce a concept method named PPMDroid to conserve bandwidth and speed up the process with many optimizations [71]. Today, in all countries, the usage of cell phones is increasing and sadly, cyber criminals are constantly targeting mobile phones.…”
Section: Related Workmentioning
confidence: 99%
“…Multi-layer perceptron's were found to work best with 99.4 percent accuracy, their project was designed to test Android malware classification algorithms [60]. A security detection approach based on the Metropolis algorithm is proposed in their article on Android introduce a concept method named PPMDroid to conserve bandwidth and speed up the process with many optimizations [90]. Today, in all countries, the usage of cell phones is increasing and sadly, cyber criminals are constantly targeting mobile phones.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This study condenses the progression of malware detection techniques supported [90] First, the privacy problems of current static and dynamic malware detection methods are highlighted…”
Section: Metropolis Algorithmmentioning
confidence: 99%