Program analysis and machine learning techniques for mobile security
Over the past few years, concerns have been raised with respect to the increasing number of malicious and clone apps infiltrating the Android markets. Android malware may perform a range of malicious activities (e.g., exfiltrating sensitive information and sending premium SMS) and clone apps steal r...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/106079 http://hdl.handle.net/10220/47894 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-106079 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1060792023-07-04T16:55:34Z Program analysis and machine learning techniques for mobile security Soh, Charlie Zhan Yi Chen Lihui School of Electrical and Electronic Engineering DRNTU::Engineering::Computer science and engineering::Software::Software engineering DRNTU::Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence Over the past few years, concerns have been raised with respect to the increasing number of malicious and clone apps infiltrating the Android markets. Android malware may perform a range of malicious activities (e.g., exfiltrating sensitive information and sending premium SMS) and clone apps steal revenue from the original developer. The detection of these adversary apps is non-trivial as in depth understanding of the apps is required. Furthermore, due to the arms race between the adversary apps and the detection algorithms, the adversary apps are constantly evolving and becoming more sophisticated. Hence, new and more effective algorithms are imperative. This thesis proposes three methods and one empirical study with suggested solutions for Android apps analysis. We address four specific issues that plague Android security, namely, clone detection, third-party library detection, malware detection and concept drift. We do so through leveraging on program analysis, Machine Learning and Deep Learning techniques. Doctor of Philosophy 2019-03-24T15:17:33Z 2019-12-06T22:04:13Z 2019-03-24T15:17:33Z 2019-12-06T22:04:13Z 2019 Thesis Soh, C. Z. Y. (2019). Program analysis and machine learning techniques for mobile security. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/106079 http://hdl.handle.net/10220/47894 10.32657/10220/47894 en 154 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering::Software::Software engineering DRNTU::Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence |
spellingShingle |
DRNTU::Engineering::Computer science and engineering::Software::Software engineering DRNTU::Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence Soh, Charlie Zhan Yi Program analysis and machine learning techniques for mobile security |
description |
Over the past few years, concerns have been raised with respect to the increasing number of malicious and clone apps infiltrating the Android markets. Android malware may perform a range of malicious activities (e.g., exfiltrating sensitive information and sending premium SMS) and clone apps steal revenue from the original developer. The detection of these adversary apps is non-trivial as in depth understanding of the apps is required. Furthermore, due to the arms race between the adversary apps and the detection algorithms, the adversary apps are constantly evolving and becoming more sophisticated. Hence, new and more effective algorithms are imperative. This thesis proposes three methods and one empirical study with suggested solutions for Android apps analysis. We address four specific issues that plague Android security, namely, clone detection, third-party library detection, malware detection and concept drift. We do so through leveraging on program analysis, Machine Learning and Deep Learning techniques. |
author2 |
Chen Lihui |
author_facet |
Chen Lihui Soh, Charlie Zhan Yi |
format |
Theses and Dissertations |
author |
Soh, Charlie Zhan Yi |
author_sort |
Soh, Charlie Zhan Yi |
title |
Program analysis and machine learning techniques for mobile security |
title_short |
Program analysis and machine learning techniques for mobile security |
title_full |
Program analysis and machine learning techniques for mobile security |
title_fullStr |
Program analysis and machine learning techniques for mobile security |
title_full_unstemmed |
Program analysis and machine learning techniques for mobile security |
title_sort |
program analysis and machine learning techniques for mobile security |
publishDate |
2019 |
url |
https://hdl.handle.net/10356/106079 http://hdl.handle.net/10220/47894 |
_version_ |
1772825744399925248 |