Jae-wook Jang

Learn More
Thousands of malicious applications targeting mobile devices, including the popular Android platform, are created every day. A large number of those applications are created by a small number of professional underground actors, however previous studies overlooked such information as a feature in detecting and classifying malware, and in attributing malware(More)
In this work, we aim to classify malware using automatic classifiers by employing graph metrics commonly used in social network analysis. First, we make a malicious system call dictionary that consists of system calls found in malware. To analyze the general structural information of malware and measure the influence of system calls found in malware, we(More)
Mobile security threats have recently emerged because of the fast growth in mobile technologies and the essential role that mobile devices play in our daily lives. For that, and to particularly address threats associated with malware, various techniques are developed in the literature, including ones that utilize static, dynamic, on-device, off-device, and(More)
AP selection problem is one of the major issues in infrastructure WLANs. Recently, many authors in the literatures have proposed a novel AP selection scheme which can provide better performance (e.g. aggregated throughput, load balancing) than RSS-based legacy scheme. However, they have presented the schemes with non-practical assumptions, e.g. they have(More)
1. SUMMARY The explosive diffusion of mobile devices running the Android platform has attracted the attention of hackers because sensitive information (e.g., phone number, SMS, banking information, and schedule information) are usually stored on mobile devices. Security for mobile devices then has become one of the most important challenge. According to(More)
With the fast growth in mobile technologies and the accompanied rise of the integration of such technologies into our everyday life, mobile security is viewed as one of the most prominent areas and is being addressed accordingly. For that, and especially to address the threat associated with malware, various malware-centric analysis methods are developed in(More)
Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices. Accordingly, techniques have been introduced for identifying, classifying, and defending against mobile threats utilizing static, dynamic, on-device, and off-device techniques. Static techniques are easy to evade, while(More)
As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns. To enrich this effort and by capitalizing on ideas from the social network analysis domain, we build a tool that can(More)