Characterizing malicious Android apps by mining topic-specific data flow signatures
Context: State-of-the-art works on automated detection of Android malware have leveraged app descriptions to spot anomalies w.r.t the functionality implemented, or have used data flow information as a feature to discriminate malicious from benign apps. Although these works have yielded promising per...
Saved in:
Main Authors: | YANG, Xinli, LO, David, LI, Li, XIA, Xin, BISSYANDE, Tegawendé F., KLEIN, Jacques |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3675 https://ink.library.smu.edu.sg/context/sis_research/article/4677/viewcontent/1_s20_S095058491730366X_main.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Understanding Android app piggybacking: A systematic study of malicious code grafting
by: LI, Li, et al.
Published: (2017) -
On locating malicious code in piggybacked Android apps
by: LI, Li, et al.
Published: (2017) -
Automatically locating malicious packages in piggybacked Android apps
by: LI, Li, et al.
Published: (2017) -
A software environment for confining malicious android applications via resource virtualization
by: Li, X., et al.
Published: (2014) -
EVALUATION OF SOFTWARE FOR MUTATIONAL SIGNATURE DISCOVERY
by: WU YANG
Published: (2022)