Structural analysis of packing schemes for extracting hidden codes in mobile malware

被引:0
|
作者
Jongsu Lim
Jeong Hyun Yi
机构
[1] Soongsil University,Department of Software
关键词
Repackaging attack; Android app security; Mobile code hiding;
D O I
暂无
中图分类号
学科分类号
摘要
In the Internet of Things service environment where all things are connected, mobile devices will become an extremely important medium linking together things with built-in heterogeneous communication functions. If a mobile device is exposed to hacking in this context, a security threat arises where all things linked to the device become targets of cyber hacking; therefore, greater emphasis will be placed on the demand for swift mobile malware detection and countermeasures. Such mobile malware applies advanced code-hiding schemes to ensure that the part of the code that executes malicious behavior is not detected by an anti-virus software. In order to detect mobile malware, we must first conduct structural analysis of their code-hiding schemes.
引用
收藏
相关论文
共 50 条
  • [21] A Behavior Analysis Based Mobile Malware Defense System
    Guo, Dai Fei
    Sui, Ai-Fen
    Guo, Tao
    6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS'2012), 2012,
  • [22] Mobile Malware Detection - An Analysis of the Impact of Feature Categories
    Khoda, Mahbub E.
    Kamruzzaman, Joarder
    Gondal, Iqbal
    Imam, Tasadduq
    NEURAL INFORMATION PROCESSING (ICONIP 2018), PT IV, 2018, 11304 : 486 - 498
  • [23] iOS mobile malware analysis: a state-of-the-art
    Saudi, Madihah Mohd
    Husainiamer, Muhammad Afif
    Ahmad, Azuan
    Idris, Mohd Yamani Idna
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (04) : 533 - 562
  • [24] Survey of Mobile Malware Analysis, Detection Techniques and Tool
    Gyamfi, Nana Kwame
    Owusu, Ebenezer
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1101 - 1106
  • [25] Mobile Malware Detection: An Analysis of Deep Learning Model
    Khoda, Mahbub E.
    Kamruzzaman, Joarder
    Gondal, Iqbal
    Imam, Tasadduq
    Rahman, Ashfaqur
    2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, : 1161 - 1166
  • [26] Further Experiments in Biocomputational Structural Analysis of Malware
    Naidu, Vijay
    Narayanan, Ajit
    2014 10TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2014, : 605 - 610
  • [27] Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence
    Caviglione, Luca
    Gaggero, Mauro
    Lalande, Jean-Francois
    Mazurczyk, Wojciech
    Urbanski, Marcin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 799 - 810
  • [28] Using Hidden Markov Model for Dynamic Malware Analysis: First Impressions
    Imran, Mohammad
    Afzal, Muhammad Tanvir
    Qadir, Muhammad Abdul
    2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2015, : 816 - 821
  • [29] Topological Data Analysis for Extracting Hidden Features of Client Data
    Schebesch, Klaus B.
    Stecking, Ralf W.
    OPERATIONS RESEARCH PROCEEDINGS 2015, 2017, : 483 - 489
  • [30] Information-Theoretic Analysis for the Difficulty of Extracting Hidden Information
    ZHANG Wei-ming 1
    2.State Key Laboratory of Information Security
    WuhanUniversityJournalofNaturalSciences, 2005, (01) : 315 - 318