INTEGRATED SOFTWARE PLATFORM FOR MALWARE ANALYSIS OF MOBILE TERMINALS

  • Dragos Bărbieru The" Carol I" National Defense University
  • Elena ȘUȘNEA The" Carol I" National Defense University
  • Ștefan-Antonio Dan ȘUTEU The" Carol I" National Defense University

Abstract

 

Beyond the marketing of IT companies, in the context of escalating cyber-attacks that affect organizations around the world, cyber security solutions have become the primary element in protecting IT infrastructures and devices. The proliferation of Intelligent Mobile Devices and Cloud Technologies, the Internet of Things requires new technological solutions, implemented both at hardware and software levels, to combat threats. This paper summarizes the Integrated Software Platform for Malware Analysis of Mobile Terminals which aims to integrate various software technologies to protect mobile devices.

References

James R. Blake, “Transforming military”, Praeger Security International, May 2007.

https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html

Elena Șușnea, Adrian Iftene, “The Significance of Online Monitoring Activities for the Social Media Intelligence (SOCMINT)”, Conference on Mathematical Foundations of Informatics MFOI'2018, Institute of Mathematics and Computer, Chisinau, Moldova, pp. 230-240, 2018.

Reza Hedayat, Lorenzo Cavallaro, The Devil’s Right Hand: An Investigation on Malware-oriented Obfuscation Techniques, Computer Weekly, August 2016.

Bărbieru, Dragoş; Stoica, Alexandru, “Malware Analysis on Mobile Phone”, The International Scientific Conference eLearning and Software for Education; Vol. 4,: 11-15, "Carol I" National Defence University, Bucharest, pp. 11-15, 2018.

https://fortiguard.com/events/755/2013-10-25-playing-hide-and-seek-with-dalvik-executables

Babak Bashari Rad†, Maslin Masrom ††, Suhaimi Ibrahim, Camouflage in Malware: from Encryption to Metamorphism, IJCSNS International Journal of Computer Science and Network Security, vol.12 No.8, August 2012.

Hannsang Kim, Member IEEE, Kang G. Shin, Padmanabhan Pillai, MODELZ: Monitoring, Detection and Analysis of Energy-Greedy Anomalies in Mobile Handsets, IEEE Transactions on mobile computing, vol. 10, July 2011.

Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, “Andromaly”: a behavioral malware detection framework for android devices.

Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra, MADAM: a Multi-Level Anomaly Detector for Android Malware, Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012.

Chin, E., Felt, A. P., Greenwood, K., and Wagner, D.: ‘ Analyzing inter-application communication in Android’. Proc. 9th Int. Conf. On Mobile Systems, Applications, and Services (MobiSys '11). ACM, Washington, DC, USA, June 2011, pp. 239-252.

Wei, X., Gomez, L., Neamtiu, I., and Faloutsos. M.: ‘ProfileDroid: multi-layer profiling of android applications’ Proc. 18th Int. Conf. On Mobile Computing and Networking (Mobicom '12). ACM, Istanbul, Turkey, August 2012, pp. 137-148.

Shuang Liang; Xiaojiang Du, Permission-combination-based scheme for Android mobile malware detection, IEEE International Conference on Communications (ICC), June, 2014.

Suleiman Y. Yerima; Sakir Sezer; Igor Muttik, Android Malware Detection Using Parallel Machine Learning Classifiers, Eighth International Conference on Next Generation Mobile Apps, Services and Technologies, December, 2014.

Xing Liu; Jiqiang Liu, A Two-Layered Permission-Based Android Malware Detection Scheme, 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, April, 2014.

BooJoong Kang, Suleiman Y. Yerima, Sakir Sezer, Kieran McLaughlin, International Journal on Cyber Situational Awareness, Vol. 1, No. 1, 2016, pp. 231-255.

Gerardo Canfora; Francesco Mercaldo; Corrado Aaron Visaggio, Mobile malware detection using op-code frequency histograms, 12th International Joint Conference on e-Business and Telecommunications (ICETE), July, 2016.

Published
2019-10-07
Section
Articole