Handset Malwares Threats Feature Extraction Based on Behavior Analysis
نویسندگان
چکیده
The malware threat for mobile phones is expected to increase with the great functionality enhancement of mobile phones. Despite the nowadays malware high abilities, there are a lot of challenges that facing the mobile threat containment process. From this perspective, this work introduces a novel effective solution for discovering handset malwares threats. The work proposed a new behavior based technique for mobile application analysis, which is based on exploiting the application DLL usages, in order to extract values that can be used in a malware detection process. The technique is highly expected to be able to detect zero day viruses that have the similar functionalities as existing ones. Also, since these DLL functions are easy to be extracted from the executable files, the approach is computationally efficient.
منابع مشابه
Analysis of Signature - Based and Behavior - Based Anti - Malware Approaches
2037 www.ijarcet.org Abstract— Malware is one of the major security threats in computer and network environment. However, Signature-based approach that commonly used does not provide enough opportunity to learn and understand malware threats that can be used in implementing security prevention mechanisms. In order to learn and understand the malwares, behavior-based technique that applied dynam...
متن کاملDetection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework
In recent years, Android based smartphones have become popular. As a feature of a smart phone, much information for identifying a user and information linked to user’s privacy is saved in a terminal. For this feature, many malwares targeting privacy information are developed. Many security mechanisms are provided in Android for such malwares. However, it is difficult for users to judge the avai...
متن کاملA review on EEG based brain computer interface systems feature extraction methods
The brain – computer interface (BCI) provides a communicational channel between human and machine. Most of these systems are based on brain activities. Brain Computer-Interfacing is a methodology that provides a way for communication with the outside environment using the brain thoughts. The success of this methodology depends on the selection of methods to process the brain signals in each pha...
متن کاملA review on EEG based brain computer interface systems feature extraction methods
The brain – computer interface (BCI) provides a communicational channel between human and machine. Most of these systems are based on brain activities. Brain Computer-Interfacing is a methodology that provides a way for communication with the outside environment using the brain thoughts. The success of this methodology depends on the selection of methods to process the brain signals in each pha...
متن کاملMalware Analysis and Classification: A Survey
One of the major and serious threats on the Internet today is malicious software, often referred to as a malware. The malwares being designed by attackers are polymorphic and metamorphic which have the ability to change their code as they propagate. Moreover, the diversity and volume of their variants severely undermine the effectiveness of traditional defenses which typically use signature bas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer and Information Science
دوره 5 شماره
صفحات -
تاریخ انتشار 2012