Using opcode-sequences to detect malicious Android applications

@article{Jrme2014UsingOT,
  title={Using opcode-sequences to detect malicious Android applications},
  author={Quentin J{\'e}r{\^o}me and Kevin Allix and Radu State and Thomas Engel},
  journal={2014 IEEE International Conference on Communications (ICC)},
  year={2014},
  pages={914-919}
}
Recently, the Android platform has seen its number of malicious applications increased sharply. Motivated by the easy application submission process and the number of alternative market places for distributing Android applications, rogue authors are developing constantly new malicious programs. While current anti-virus software mainly relies on signature detection, the issue of alternative malware detection has to be addressed. In this paper, we present a feature based detection mechanism… CONTINUE READING
Highly Cited
This paper has 27 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 16 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 24 references

Code protection in android

  • S. Patrick
  • Rheinische Friedrich- Wilhelms-Universität Bonn…
  • 2012
1 Excerpt

Dissecting the android bouncer

  • J. Oberheide, C. Miller
  • Summer- Con2012, New York, 2012.
  • 2012
1 Excerpt

Similar Papers

Loading similar papers…