Structural analysis of packing schemes for extracting hidden codes in mobile malware

被引:0
|
作者
Jongsu Lim
Jeong Hyun Yi
机构
[1] Soongsil University,Department of Software
关键词
Repackaging attack; Android app security; Mobile code hiding;
D O I
暂无
中图分类号
学科分类号
摘要
In the Internet of Things service environment where all things are connected, mobile devices will become an extremely important medium linking together things with built-in heterogeneous communication functions. If a mobile device is exposed to hacking in this context, a security threat arises where all things linked to the device become targets of cyber hacking; therefore, greater emphasis will be placed on the demand for swift mobile malware detection and countermeasures. Such mobile malware applies advanced code-hiding schemes to ensure that the part of the code that executes malicious behavior is not detected by an anti-virus software. In order to detect mobile malware, we must first conduct structural analysis of their code-hiding schemes.
引用
收藏
相关论文
共 50 条
  • [1] Structural analysis of packing schemes for extracting hidden codes in mobile malware
    Lim, Jongsu
    Yi, Jeong Hyun
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016, : 1 - 12
  • [2] GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities
    Marastoni, Niccolo
    Continella, Andrea
    Quarta, Davide
    Zanero, Stefano
    Dalla Preda, Mila
    PROCEEDINGS OF THE 7TH SOFTWARE SECURITY, PROTECTION, AND REVERSE ENGINEERING WORKSHOP 2017 (SSPREW), 2017,
  • [3] Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem
    Mantovani, Alessandro
    Aonzo, Simone
    Ugarte-Pedrero, Xabier
    Merlo, Alessio
    Balzarotti, Davide
    27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
  • [4] Evaluating Mobile Malware by Extracting User Experience-Based Features
    Mercaldo, Francesco
    Visaggio, Corrado Aaron
    PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT, PROFES 2015, 2015, 9459 : 497 - 512
  • [5] Hidden safety in structural design codes
    Teichgraeber, Max
    Kohler, Jochen
    Straub, Daniel
    ENGINEERING STRUCTURES, 2022, 257
  • [6] Malware Analysis on Mobile Phone
    Barbieru, Dragos
    Stoica, Alexandru
    ELEARNING CHALLENGES AND NEW HORIZONS, VOL 4, 2018, : 11 - 15
  • [7] Hidden Structural Codes in Protein Intrinsic Disorder
    Borkosky, Silvia S.
    Camporeale, Gabriela
    Chemes, Lucia B.
    Risso, Marikena
    Noval, Maria Gabriela
    Sanchez, Ignacio E.
    Alonso, Leonardo G.
    de Prat Gay, Gonzalo
    BIOCHEMISTRY, 2017, 56 (41) : 5560 - 5569
  • [8] Hidden Structural Codes in Protein Intrinsic Disorder
    de Prat Gay, Gonzalo
    BIOPHYSICAL JOURNAL, 2018, 114 (03) : 592A - 592A
  • [9] Hidden Structural Codes in Protein Intrinsic Disorder
    de Prat Gay, Gonzalo
    Borkosky, Silvina
    Alonso, Leonardo
    Sanchez, Ignacio
    PROTEIN SCIENCE, 2017, 26 : 125 - 125
  • [10] Exploratory Malware Analysis of Mobile Usages
    Zheng, Yong
    Srinivasan, Sridhar
    Taehun, Kim
    SIGITE'18: PROCEEDINGS OF THE 19TH ANNUAL SIG CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION, 2018, : 158 - 158