Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BareCloud: Bare-metal Analysis-based Evasive Malware Detection

The volume and the sophistication of malware are continuously increasing and evolving. Automated dynamic malware analysis is a widely-adopted approach for detecting malicious software. However, many recent malware samples try to evade detection by identifying the presence of the analysis environment itself, and refraining from performing malicious actions. Because of the sophistication of the t...

متن کامل

Siren: Catching Evasive Malware (Short Paper)

With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legitimate activity to blend in and avoid detection. We propose a new system called Siren that injects crafted human input alongside legitimate user activity to thwart these mimicry attacks. The crafted input is specially de...

متن کامل

Personal Mobile Malware Guard PMMG: a mobile malware detection technique based on user's preferences

Mobile malware has increased rapidly last 10 years. This rapid increase is due to the rapid enhancement of mobile technology and their power to do most work for their users. Since mobile devices are personal devices, then a special action must be taken towards preserving privacy and security of the mobile data. Malware refers to all types of software applications with malicious behavior. In thi...

متن کامل

Behaviour Based Malware Detection

This article looks at the future of antivirus technology in IT security, discussing some of the latest malware threats and counter developments. We specifically examine key developments in proactive malware detection based on real-time behavioural analysis, to combat 0-day threats.

متن کامل

Permission-Based Android Malware Detection

Mobile devices have become popular in our lives since they offer almost the same functionality as personal computers. Among them, Android-based mobile devices had appeared lately and, they were now an ideal target for attackers. Android-based smartphone users can get free applications from Android Application Market. But, these applications were not certified by legitimate organizations and the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2020

ISSN: 1939-0114,1939-0122

DOI: 10.1155/2020/6726147