Mining structural and behavioral patterns in smart malware

Mining structural and behavioral patterns in smart malware

Fecha: noviembre 2016
Guillermo Suarez-Tangil
Monografías

Sumario

  • ACKNOWLEDGMENTS
  • ABSTRACT
  • RESUMEN
  • 1.1. SMART MALWARE AND SMART DEVICES
  • 1.2. MOTIVATION AND OBJECTIVES
  • 1.3. CONTRIBUTIONS AND ORGANIZATION
  • 2.1. INTRODUCTION
  • 2.2. SECURITY MODELS IN CURRENT SMART DEVICES
  • 2.3. MALWARE IN SMART DEVICES: EVOLUTION, CHARACTERIZATION AND EXAMPLES
  • 2.4. MALWARE DETECTION AND ANALYSIS
  • 3.1. INTRODUCTION
  • 3.2. STATIC ANALYSIS
  • 3.3. DYNAMIC ANALYSIS
  • 3.4. CLOUD ANALYSIS AND CONSUMPTION METERING
  • 3.5. ONLINET MARKETS AND MALWARE REPOSITORIES
  • 4.1. INTRODUCTION
  • 4.2. DATASET AND EXPERIMENTAL SETTING
  • 4.3. ANALYSIS OF CODE STRUCTURES IN ANDROID MALWARE FAMILIES
  • 4.4. MINING CODE CHUNKS IN MALWARE FAMILIES
  • 4.5. CONCLUSIONS
  • 5.1. INTRODUCTION
  • 5.2. A DIFFERENTIAL FAULT ANALYSIS MODEL
  • 5.3. ALTERDROID: DIFFERENTIAL FAULT ANALYSIS OF OBFUSCATED APPS
  • 5.4. EVALUATION
  • 5.5. CONCLUSIONS
  • 6.1. INTRODUCTION
  • 6.2. EXPERIMENTAL SETTING
  • 6.3. ENERGY CONSUMPTION OF ANOMALY DETECTION COMPONENTS
  • 6.4. DEPLOYMENT STRATEGIES AND TRADE-OFFS
  • 6.5. CASE STUDY: A DETECTOR OF REPACKAGED MALWARE
  • 6.6. CONCLUSIONS
  • 7.1. INTRODUCTION
  • 7.2. BEHAVIORAL MODELS
  • 7.3. TARGETED TESTING IN THE CLOUD
  • 7.4. CASE STUDIES
  • 7.5. CONCLUSIONS
  • 8.1. CONTRIBUTIONS
  • 8.2. OPEN ISSUES AND FUTURE WORK
  • 8.3. RESULTS
Funcas

Think tank dedicado a la investigación económica y social

Contacto
C/ Caballero de Gracia, 28 | 28013 Madrid, España
+34 91 596 57 18 | funcas@funcas.es
Síguenos
Send this to a friend