作者
Feng Shen, Justin Del Vecchio, Aziz Mohaisen, Steven Y Ko, Lukasz Ziarek
发表日期
2018
期刊
IEEE TMC
简介
This paper proposes a new technique to detect mobile malware based on information flow analysis. Our approach examines the structure of information flows to identify patterns of behavior present in them and which flows are related, those that share partial computation paths. We call such flows Complex-Flows, as their structure, patterns, and relations accurately capture the complex behavior exhibited by both recent malware and benign applications. N-gram analysis is used to identify unique and common behavioral patterns present in Complex-Flows. The N-gram analysis is performed on sequences of API calls that occur along Complex-Flows' control flow paths. We show the precision of our technique by applying it to four different data sets totaling 8,598 apps. These data sets consist of both recent and older generation benign and malicious apps to demonstrate the effectiveness of our approach across different …
引用总数
201720182019202020212022202320243913231420176
学术搜索中的文章
F Shen, J Del Vecchio, A Mohaisen, SY Ko, L Ziarek - IEEE Transactions on Mobile Computing, 2018
F Shen, J Del Vecchio, A Mohaisen, SY Ko, L Ziarek - Proceedings of the 15th Annual International …, 2017