PLATFORMA SOFTWARE INTEGRATĂ PENTRU ANALIZA MALWARE A TERMINALELOR MOBILE

Authors

  • Dragos BĂRBIERU The" Carol I" National Defense University
  • Col.dr.Ștefan-Antonio Dan ȘUTEU Universitatea Nationala de Aparare "Carol I"
  • Conf. univ. dr. Elena ȘUȘNEA Universitatea Nationala de Aparare "Carol I"

Abstract

Dincolo de marketingul companiilor IT, în contextul escaladării atacurilor cibernetice, care afectează organizațiile din întreaga lume, soluțiile de securitate cibernetică devin elementul principal în protejarea infrastructurilor și dispozitivelor IT. Diversitatea dispozitivelor mobile inteligente și apariția tehnologiilor cloud, Internet of Things necesită noi soluții tehnologice, implementate atât la nivel hardware, cât și la nivel software în scopul combaterii amenințărilor. Acest articol prezintă rezultatele parțiale din proiectul de cercetare care are ca obiectiv realizarea platformei software integrate pentru analiza programelor malware ale terminalelor mobile. Platforma integrează diverse tehnologii software pentru protejarea dispozitivelor mobile.

References

Babak Bashari Rad, Maslin Masrom, Suhaimi Ibrahim, Camouflage în Malware: from Encryption to Metamorphism, IJCSNS International Journal of Computer Science and Network Security, vol. 12, No. 8, August 2012.

Bărbieru Dragoş, Stoica Alexandru, Malware Analysis on Mobile Phone, The International Scientific Conference eLearning and Software for Education, Vol. 4, ”Carol I” National Defence University, Bucharest, 2018.

Blake R. James, Transforming military, Praeger Security International, May 2007.

Canfora Gerardo, Mercaldo Francesco, Visaggio Corrado Aaron, Mobile malware detection using op-code frequency histograms, 12th International Joint Conference on e-Business and Telecommunications (ICETE), July 2016.

Chin E., Felt A.P., Greenwood K., Wagner D., Analyzing inter-application communication în Android, Proc. 9th Int. Conf. On Mobile Systems, Applications, and Services (MobiSys '11). ACM, Washington, DC, USA, June 2011.

Dini Gianluca, Martinelli Fabio, Saracino Andrea, Sgandurra Daniele, MADAM: a Multi-Level Anomaly Detector for Android Malware, Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012.

Hannsang Kim, Member IEEE, Kang G. Shin, Padmanabhan Pillai, MODELZ: Monitoring, Detection and Analysis of Energy-Greedy Anomalies în Mobile Handsets, IEEE Transactions on mobile computing, vol. 10, July 2011.

Hedayat Reza, Cavallaro Lorenzo, The Devil’s Right Hand: An Investigation on Malware-oriented Obfuscation Techniques, Computer Weekly, August 2016.

Kang BooJoong, Yerima Y. Suleiman, Sezer Sakir, McLaughlin Kieran, International Journal on Cyber Situational Awareness, Vol. 1, No. 1, 2016.

Shabtai Asaf, Kanonov Uri, Elovici Yuval, Glezer Chanan, Weiss Yael, Andromaly: a behavioral malware detection framework for android devices.

Shuang Liang, Xiaojiang Du, Permission-combination-based scheme for Android mobile malware detection, IEEE International Conference on Communications (ICC), June 2014.

Șușnea Elena, Iftene Adrian, The Significance of Online Monitoring Activities for the Social Media Intelligence (SOCMINT), Conference on Mathematical Foundations of Informatics MFOI'2018, Institute of Mathematics and Computer, Chisinau, Moldova, 2018.

Wei X., Gomez L., Neamtiu I., Faloutsos M., ProfileDroid: multi-layer profiling of android applications, Proc. 18th Int. Conf. On Mobile Computing and Networking (Mobicom '12). ACM, Istanbul, Turkey, August 2012.

Xing Liu; Jiqiang Liu, A Two-Layered Permission-Based Android Malware Detection Scheme, 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, April, 2014.

Yerima Y. Suleiman, Sezer Sakir, Muttik Igor, Android Malware Detection Using Parallel Machine Learning Classifiers, Eighth International Conference on Next Generation Mobile Apps, Services and Technologies, December, 2014.

https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html

https://fortiguard.com/events/755/2013-10-25-playing-hide-and-seek-with-dalvik-executables

Published

2019-10-08

Issue

Section

Articole