Structural analysis of packing schemes for extracting hidden codes in mobile malware

被引:0
|
作者
Jongsu Lim
Jeong Hyun Yi
机构
[1] Soongsil University,Department of Software
关键词
Repackaging attack; Android app security; Mobile code hiding;
D O I
暂无
中图分类号
学科分类号
摘要
In the Internet of Things service environment where all things are connected, mobile devices will become an extremely important medium linking together things with built-in heterogeneous communication functions. If a mobile device is exposed to hacking in this context, a security threat arises where all things linked to the device become targets of cyber hacking; therefore, greater emphasis will be placed on the demand for swift mobile malware detection and countermeasures. Such mobile malware applies advanced code-hiding schemes to ensure that the part of the code that executes malicious behavior is not detected by an anti-virus software. In order to detect mobile malware, we must first conduct structural analysis of their code-hiding schemes.
引用
收藏
相关论文
共 50 条
  • [31] File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for Enhancements
    Muralidharan, Trivikram
    Cohen, Aviad
    Gerson, Noa
    Nissim, Nir
    ACM COMPUTING SURVEYS, 2023, 55 (05)
  • [32] Generic Packing Detection using Several Complexity Analysis for Accurate Malware Detection
    Al-Anezi, Mafaz Mohsin Khalil
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 7 - 14
  • [33] Exploring multiple execution paths for malware analysis based on coverage of codes
    Wang, Xiang-Gen
    Si, Duan-Feng
    Feng, Deng-Guo
    Su, Pu-Rui
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2009, 37 (04): : 701 - 705
  • [34] Performance analysis of block codes in hidden Markov channels
    Lee, Chang-Ming
    Su, Yu. T.
    Jeng, Li-Der
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2008, 56 (01) : 1 - 4
  • [35] Thermodynamic Analysis of Structural Schemes of Mobile Compressor Power Plants with the System of Heat Loses Recuparation
    Yusha, V. L.
    Chernov, G. I.
    2014 DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2014,
  • [36] USE OF COMPUTER CODES IN ANALYSIS OF NUCLEAR LEVEL SCHEMES
    LEVY, HB
    LANIER, RG
    IMMELE, JD
    MEYER, RA
    BULLETIN OF THE AMERICAN PHYSICAL SOCIETY, 1970, 15 (04): : 598 - &
  • [37] Integrated Software Platform for Mobile Malware Analysis - A Potential Vision
    Suciu, George
    Bezdedeanu, Laurentiu
    Istrate, Cristiana
    Sachian, Mari-Anais
    Boukoulo, Houssam
    Boscher, Corentin
    Souleyreau, Fabien
    Popovici, Eduard-Cristian
    FUTURE ACCESS ENABLERS FOR UBIQUITOUS AND INTELLIGENT INFRASTRUCTURES, FABULOUS 2019, 2019, 283 : 431 - 436
  • [38] Function-Oriented Mobile Malware Analysis as First Aid
    Jang, Jae-wook
    Kim, Huy Kang
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [39] EnMobile: Entity-based Characterization and Analysis of Mobile Malware
    Yang, Wei
    Prasad, Mukul R.
    Xie, Tao
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 384 - 394
  • [40] Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model
    Ling, Yeong Tyng
    Sani, Nor Fazlida Mohd
    Abdullah, Mohd Taufik
    Hamid, Nor Asilah Wati Abdul
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (03) : 183 - 203