Funcas studies

Portada publicación
Mining structural and behavioral patterns in smart malware / Guillermo Suarez-Tangil; (2016), nº 86
November - 2016

Sumario

ACKNOWLEDGMENTS ABSTRACT RESUMEN 1.1. SMART MALWARE AND SMART DEVICES 1.2. MOTIVATION AND OBJECTIVES 1.3. CONTRIBUTIONS AND ORGANIZATION 2.1. INTRODUCTION 2.2. SECURITY MODELS IN CURRENT SMART DEVICES 2.3. MALWARE IN SMART DEVICES: EVOLUTION, CHARACTERIZATION AND EXAMPLES 2.4. MALWARE DETECTION AND ANALYSIS 3.1. INTRODUCTION 3.2. STATIC ANALYSIS 3.3. DYNAMIC ANALYSIS 3.4. CLOUD ANALYSIS AND CONSUMPTION METERING 3.5. ONLINET MARKETS AND MALWARE REPOSITORIES 4.1. INTRODUCTION 4.2. DATASET AND EXPERIMENTAL SETTING 4.3. ANALYSIS OF CODE STRUCTURES IN ANDROID MALWARE FAMILIES 4.4. MINING CODE CHUNKS IN MALWARE FAMILIES 4.5. CONCLUSIONS 5.1. INTRODUCTION 5.2. A DIFFERENTIAL FAULT ANALYSIS MODEL 5.3. ALTERDROID: DIFFERENTIAL FAULT ANALYSIS OF OBFUSCATED APPS 5.4. EVALUATION 5.5. CONCLUSIONS 6.1. INTRODUCTION 6.2. EXPERIMENTAL SETTING 6.3. ENERGY CONSUMPTION OF ANOMALY DETECTION COMPONENTS 6.4. DEPLOYMENT STRATEGIES AND TRADE-OFFS 6.5. CASE STUDY: A DETECTOR OF REPACKAGED MALWARE 6.6. CONCLUSIONS 7.1. INTRODUCTION 7.2. BEHAVIORAL MODELS 7.3. TARGETED TESTING IN THE CLOUD 7.4. CASE STUDIES 7.5. CONCLUSIONS 8.1. CONTRIBUTIONS 8.2. OPEN ISSUES AND FUTURE WORK 8.3. RESULTS