The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

A survey of intrusion detection in wireless network applications

R Mitchell, R Chen - Computer Communications, 2014 - Elsevier
Abstract Information systems are becoming more integrated into our lives. As this integration
deepens, the importance of securing these systems increases. Because of lower installation …

“Andromaly”: a behavioral malware detection framework for android devices

A Shabtai, U Kanonov, Y Elovici, C Glezer… - Journal of Intelligent …, 2012 - Springer
This article presents Andromaly—a framework for detecting malware on Android mobile
devices. The proposed framework realizes a Host-based Malware Detection System that …

Method and system for configuring and scheduling security audits of a computer network

RD Zobel, TD Dodd, SA Millar, DG Nesfeder Jr… - US Patent …, 2008 - Google Patents
Managing the selection and scheduling of security audits run on a computing network. The
computer network is surveyed by a security audit system to determine the function and …

Static analysis of executables for collaborative malware detection on android

AD Schmidt, R Bye, HG Schmidt… - 2009 IEEE …, 2009 - ieeexplore.ieee.org
Smartphones are getting increasingly popular and several malwares appeared targeting
these devices. General countermeasures to smartphone malwares are currently limited to …

Analytical virtual machine

PAJ van der Made - US Patent 7,657,419, 2010 - Google Patents
An analytical virtual machine (AVM) analyzes computer code using a software processor
including a register that stores behavior flags indicative of behaviors identified by virtually …

Vulnerability assessment and authentication of a computer by a local scanner

P Taylor, S Mewett, PC Brass, TR Doty - US Patent 7,178,166, 2007 - Google Patents
US PATENT DOCUMENTS the scanner? nds a vulnerability, the scanner can inform the
user that the machine is or may be compromised, or repair 4,223,380 A 9/1980 Amonaccio …

System and method for managing security events on a network

GN Houston, CD Kobsa, S Embar, MT Di Iorio… - US Patent …, 2011 - Google Patents
A computer-implemented system for managing security event data collected from a
computing network. The system employs an event managing software module that can …

Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method

A Shabtai, U Kanonov, Y Elovici - Journal of systems and Software, 2010 - Elsevier
In this paper, a new approach for detecting previously unencountered malware targeting
mobile device is proposed. In the proposed approach, time-stamped security data is …

Method and system for dynamically protecting a computer system from attack

CJ Rouland, PM Becker, CW Klaus - US Patent 7,913,303, 2011 - Google Patents
US PATENT DOCUMENTS protection system can receive policy updates to allow it to
protect the system more efficiently and effectively. In other words, the dynamic protection …