A SIMILAR MODULE EXTRACTION APPROACH FOR ANDROID MALWARE
文献类型:会议论文
作者 | ZHENG-QIANG LI; YAN-CHEN QIAO; TOUHIDUL HASAN; QING-SHAN JIANG |
出版日期 | 2018 |
会议日期 | 2018 |
会议地点 | 深圳 |
英文摘要 | Android is the popular mobile operating system, and it has been attracting many developers and malware software authors into the field. It is becoming critical to identify the malicious program in the large count of mobile applications, whereas similarity comparison methods have been proposed earlier to detect malware. However, most of the works focus on detecting malicious program from benign and malware, and they did not consider the details of similarity between malicious programs. In this paper, we propose an approach based on key function call graph to extract similar module between malware which could be used to detect malicious programs on Android platform. The proposed method employs Android system API call sequences to construct the similar module between two malicious programs. The experiments on real-world dataset demonstrate that the proposed approach is effective for extracting similar modules between malware. |
语种 | 英语 |
URL标识 | 查看原文 |
源URL | [http://ir.siat.ac.cn:8080/handle/172644/14082] ![]() |
专题 | 深圳先进技术研究院_数字所 |
推荐引用方式 GB/T 7714 | ZHENG-QIANG LI,YAN-CHEN QIAO,TOUHIDUL HASAN,et al. A SIMILAR MODULE EXTRACTION APPROACH FOR ANDROID MALWARE[C]. 见:. 深圳. 2018. |
入库方式: OAI收割
来源:深圳先进技术研究院
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。