Program analysis and machine learning techniques for mobile security

Over the past few years, concerns have been raised with respect to the increasing number of malicious and clone apps infiltrating the Android markets. Android malware may perform a range of malicious activities (e.g., exfiltrating sensitive information and sending premium SMS) and clone apps steal r...

Full description

Saved in:
Bibliographic Details
Main Author: Soh, Charlie Zhan Yi
Other Authors: Chen Lihui
Format: Theses and Dissertations
Language:English
Published: 2019
Subjects:
Online Access:https://hdl.handle.net/10356/106079
http://hdl.handle.net/10220/47894
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-106079
record_format dspace
spelling sg-ntu-dr.10356-1060792023-07-04T16:55:34Z Program analysis and machine learning techniques for mobile security Soh, Charlie Zhan Yi Chen Lihui School of Electrical and Electronic Engineering DRNTU::Engineering::Computer science and engineering::Software::Software engineering DRNTU::Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence Over the past few years, concerns have been raised with respect to the increasing number of malicious and clone apps infiltrating the Android markets. Android malware may perform a range of malicious activities (e.g., exfiltrating sensitive information and sending premium SMS) and clone apps steal revenue from the original developer. The detection of these adversary apps is non-trivial as in depth understanding of the apps is required. Furthermore, due to the arms race between the adversary apps and the detection algorithms, the adversary apps are constantly evolving and becoming more sophisticated. Hence, new and more effective algorithms are imperative. This thesis proposes three methods and one empirical study with suggested solutions for Android apps analysis. We address four specific issues that plague Android security, namely, clone detection, third-party library detection, malware detection and concept drift. We do so through leveraging on program analysis, Machine Learning and Deep Learning techniques. Doctor of Philosophy 2019-03-24T15:17:33Z 2019-12-06T22:04:13Z 2019-03-24T15:17:33Z 2019-12-06T22:04:13Z 2019 Thesis Soh, C. Z. Y. (2019). Program analysis and machine learning techniques for mobile security. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/106079 http://hdl.handle.net/10220/47894 10.32657/10220/47894 en 154 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering::Software::Software engineering
DRNTU::Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence
spellingShingle DRNTU::Engineering::Computer science and engineering::Software::Software engineering
DRNTU::Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence
Soh, Charlie Zhan Yi
Program analysis and machine learning techniques for mobile security
description Over the past few years, concerns have been raised with respect to the increasing number of malicious and clone apps infiltrating the Android markets. Android malware may perform a range of malicious activities (e.g., exfiltrating sensitive information and sending premium SMS) and clone apps steal revenue from the original developer. The detection of these adversary apps is non-trivial as in depth understanding of the apps is required. Furthermore, due to the arms race between the adversary apps and the detection algorithms, the adversary apps are constantly evolving and becoming more sophisticated. Hence, new and more effective algorithms are imperative. This thesis proposes three methods and one empirical study with suggested solutions for Android apps analysis. We address four specific issues that plague Android security, namely, clone detection, third-party library detection, malware detection and concept drift. We do so through leveraging on program analysis, Machine Learning and Deep Learning techniques.
author2 Chen Lihui
author_facet Chen Lihui
Soh, Charlie Zhan Yi
format Theses and Dissertations
author Soh, Charlie Zhan Yi
author_sort Soh, Charlie Zhan Yi
title Program analysis and machine learning techniques for mobile security
title_short Program analysis and machine learning techniques for mobile security
title_full Program analysis and machine learning techniques for mobile security
title_fullStr Program analysis and machine learning techniques for mobile security
title_full_unstemmed Program analysis and machine learning techniques for mobile security
title_sort program analysis and machine learning techniques for mobile security
publishDate 2019
url https://hdl.handle.net/10356/106079
http://hdl.handle.net/10220/47894
_version_ 1772825744399925248