Randomizing Smartphone Malware Profiles against Statistical Mining Techniques

@inproceedings{Shastry2012RandomizingSM,
  title={Randomizing Smartphone Malware Profiles against Statistical Mining Techniques},
  author={Abhijith Shastry and Murat Kantarcioglu and Yan Zhou and Bhavani M. Thuraisingham},
  booktitle={DBSec},
  year={2012}
}
The growing use of smartphones opens up new opportunities for malware activities such as eavesdropping on phone calls, reading e-mail and call-logs, and tracking callers' locations. Statistical data mining techniques have been shown to be applicable to detect smartphone malware. In this paper, we demonstrate that statistical mining techniques are prone to attacks that lead to random smartphone malware behavior. We show that with randomized profiles, statistical mining techniques can be easily… 
Comprehensive review and analysis of anti-malware apps for smartphones
TLDR
This work reviews the functionalities and services of several anti-malware companies to fully reveal their security mechanisms, features and strategies and highlights the open challenges and issues related to the evaluation and benchmarking of malware detection techniques to identify the best malware detection apps for smartphones.
Identifying malicious Android apps using permissions and system events
TLDR
The permission-based approach is extended and machine learning approaches are employed to identify the malicious applications and the experimental results illustrate the effectiveness of the proposal.
A Comparative Analysis of Properties that May be Used for Malware Detection
  • Jimmy Hua, Aaron Hunter
  • Computer Science
    2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
  • 2018
TLDR
Eight different code features that could be used to reduce the effectiveness of Android malware analysis tools are considered, by comparing malware samples and non-malware samples from the Google Play Store to determine if any of them is associated more closely with malware that has escaped detection.
Detection of malware applications from centrality measures of syscall graph
TLDR
A dynamic analysis mechanism for Android malware detection that modeled the syscall trace of an application as an ordered graph which enabled to infer various kinds of features in the form of centrality measures related to that syscal trace of the application.
Characterizing Evaluation Practices of Intrusion Detection Methods for Smartphones
TLDR
An overview of the research in the field of intrusion detection techniques for the Android platform is given and a set of guidelines that could help researchers to avoid common pitfalls and improve the quality of their work are presented.
A Framework for Managing the Assured Information Sharing Lifecycle
TLDR
AISL (Assured Information Sharing Lifecycle) is a MURI project that is developing new approaches to support assured information sharing and was productive with significant results achieved across all areas of the project.

References

SHOWING 1-10 OF 26 REFERENCES
Detecting energy-greedy anomalies and mobile malware variants
TLDR
A power-aware malware-detection framework that monitors, detects, and analyzes previously unknown energy-depletion threats and achieves significant storage-savings without losing the detection accuracy, and a 99% true-positive rate in classifying mobile malware.
Behavioral detection of malware on mobile handsets
TLDR
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devices and indicates that behavioral detection can identify current mobile viruses and worms with more than 96% accuracy.
Limits of Static Analysis for Malware Detection
TLDR
A binary obfuscation scheme that relies on opaque constants, which are primitives that allow us to load a constant into a register such that an analysis tool cannot determine its value, demonstrates that static analysis techniques alone might no longer be sufficient to identify malware.
“Andromaly”: a behavioral malware detection framework for android devices
TLDR
Empirical results suggest that the proposed framework, Andromaly, is effective in detecting malware on mobile devices in general and on Android in particular.
SmartSiren: virus detection and alert for smartphones
TLDR
SmartSiren is presented, a collaborative virusdetection and alert system for smartphones that uses a proxy-based architecture to offload the processing burden from resource-constrained smartphones and simplify the collaboration among smartphones.
On rootkit and malware detection in smartphones
TLDR
A new strategy is introduced that offers a solution to efficiently detect the presence of rootkits and mal-ware in smartphones and a prototype based on this strategy has been built for the android dev phone.
Learning and Classification of Malware Behavior
TLDR
The effectiveness of the proposed method for learning and discrimination of malware behavior is demonstrated, especially in detecting novel instances of malware families previously not recognized by commercial anti-virus software.
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
TLDR
A permissionbased behavioral footprinting scheme to detect new samples of known Android malware families and a heuristics-based filtering scheme to identify certain inherent behaviors of unknown malicious families are proposed.
Malware Behavior Analysis: Learning and Understanding Current Malware Threats
  • M. F. Zolkipli, A. Jantan
  • Computer Science
    2010 Second International Conference on Network Applications, Protocols and Services
  • 2010
TLDR
A new approach for conducting behavior-based analysis of malicious programs is presented and it is shown that the most potential malware threats in campus network are worm and Trojan.
Fileprint analysis for Malware Detection 1
TLDR
The astonishing observation that anti-virus systems can be easily deceived even given a signature for the hidden malcode is observed and the use of statistical content analysis of files is explored in order to detect anomalous file segments that may suggest infection by malcode.
...
1
2
3
...