Power Consumption Based Android Malware Detection
نویسندگان
چکیده
منابع مشابه
Permission-Based Android Malware Detection
Mobile devices have become popular in our lives since they offer almost the same functionality as personal computers. Among them, Android-based mobile devices had appeared lately and, they were now an ideal target for attackers. Android-based smartphone users can get free applications from Android Application Market. But, these applications were not certified by legitimate organizations and the...
متن کاملPermission based Malware Analysis & Detection in Android
Android being a leading and the most popular operating system for smart phones and tablets, has also become a prime target for the attackers due to its growing users and it being an open source platform. This document describes the work done in detecting malware in the Android platform by performing static analysis on the permission based framework in Android platform. In our work, we have extr...
متن کاملDroidMat: Android Malware Detection
Recently, the threat of Android malware is spreading rapidly, especially those repackaged Android malware. Although understanding Android malware using dynamic analysis can provide a comprehensive view, it is still subjected to high cost in environment deployment and manual efforts in investigation. In this study, we propose a static feature-based mechanism to provide a static analyst paradigm ...
متن کاملAndroid Malware Detection Based on System Calls
With Android being the most widespread mobile platform, protecting it against malicious applications is essential. Android users typically install applications from large remote repositories, which provides ample opportunities for malicious newcomers. In this paper, we propose a simple, and yet highly effective technique for detecting malicious Android applications on a repository level. Our te...
متن کاملTowards a Malware Detection Framework Based on Power Consumption Monitoring
As our personal, organizational, and critical infrastructure are increasingly dependent on networked computing assets, malicious software —malware—is one of the most serious national security threats. Common malware detection practices are proving insufficient, and the task poses significant challenges when faced with automatically generated and polymorphic malware, as well as rootkits, which a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Electrical and Computer Engineering
سال: 2016
ISSN: 2090-0147,2090-0155
DOI: 10.1155/2016/6860217