INTEGRATED SOFTWARE PLATFORM FOR MALWARE ANALYSIS OF MOBILE TERMINALS
Beyond the marketing of IT companies, in the context of escalating cyber-attacks that affect organizations around the world, cyber security solutions have become the primary element in protecting IT infrastructures and devices. The proliferation of Intelligent Mobile Devices and Cloud Technologies, the Internet of Things requires new technological solutions, implemented both at hardware and software levels, to combat threats. This paper summarizes the Integrated Software Platform for Malware Analysis of Mobile Terminals which aims to integrate various software technologies to protect mobile devices.
James R. Blake, “Transforming military”, Praeger Security International, May 2007.
Elena Șușnea, Adrian Iftene, “The Significance of Online Monitoring Activities for the Social Media Intelligence (SOCMINT)”, Conference on Mathematical Foundations of Informatics MFOI'2018, Institute of Mathematics and Computer, Chisinau, Moldova, pp. 230-240, 2018.
Reza Hedayat, Lorenzo Cavallaro, The Devil’s Right Hand: An Investigation on Malware-oriented Obfuscation Techniques, Computer Weekly, August 2016.
Bărbieru, Dragoş; Stoica, Alexandru, “Malware Analysis on Mobile Phone”, The International Scientific Conference eLearning and Software for Education; Vol. 4,: 11-15, "Carol I" National Defence University, Bucharest, pp. 11-15, 2018.
Babak Bashari Rad†, Maslin Masrom ††, Suhaimi Ibrahim, Camouflage in Malware: from Encryption to Metamorphism, IJCSNS International Journal of Computer Science and Network Security, vol.12 No.8, August 2012.
Hannsang Kim, Member IEEE, Kang G. Shin, Padmanabhan Pillai, MODELZ: Monitoring, Detection and Analysis of Energy-Greedy Anomalies in Mobile Handsets, IEEE Transactions on mobile computing, vol. 10, July 2011.
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, “Andromaly”: a behavioral malware detection framework for android devices.
Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra, MADAM: a Multi-Level Anomaly Detector for Android Malware, Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012.
Chin, E., Felt, A. P., Greenwood, K., and Wagner, D.: ‘ Analyzing inter-application communication in Android’. Proc. 9th Int. Conf. On Mobile Systems, Applications, and Services (MobiSys '11). ACM, Washington, DC, USA, June 2011, pp. 239-252.
Wei, X., Gomez, L., Neamtiu, I., and Faloutsos. M.: ‘ProfileDroid: multi-layer profiling of android applications’ Proc. 18th Int. Conf. On Mobile Computing and Networking (Mobicom '12). ACM, Istanbul, Turkey, August 2012, pp. 137-148.
Shuang Liang; Xiaojiang Du, Permission-combination-based scheme for Android mobile malware detection, IEEE International Conference on Communications (ICC), June, 2014.
Suleiman Y. Yerima; Sakir Sezer; Igor Muttik, Android Malware Detection Using Parallel Machine Learning Classifiers, Eighth International Conference on Next Generation Mobile Apps, Services and Technologies, December, 2014.
Xing Liu; Jiqiang Liu, A Two-Layered Permission-Based Android Malware Detection Scheme, 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, April, 2014.
BooJoong Kang, Suleiman Y. Yerima, Sakir Sezer, Kieran McLaughlin, International Journal on Cyber Situational Awareness, Vol. 1, No. 1, 2016, pp. 231-255.
Gerardo Canfora; Francesco Mercaldo; Corrado Aaron Visaggio, Mobile malware detection using op-code frequency histograms, 12th International Joint Conference on e-Business and Telecommunications (ICETE), July, 2016.
How to Cite
The published articles are subject to copyright law. All rights are reserved to the “Carol I” National Defense University, regardless of whether all or part of the material are considered, especially the rights to translation, reprinting, re-use of illustrations, quotations, broadcasting through the media, reproduction on microfilms or any other way and storage in data banks. Any replicas without the associated fees are authorized provided the source is acknowledged.