Mining structural and behavioral patterns in smart malware
Fecha: noviembre 2016
Guillermo Suarez-Tangil
Monografías
Sumario
- ACKNOWLEDGMENTS
- ABSTRACT
- RESUMEN
- 1.1. SMART MALWARE AND SMART DEVICES
- 1.2. MOTIVATION AND OBJECTIVES
- 1.3. CONTRIBUTIONS AND ORGANIZATION
- 2.1. INTRODUCTION
- 2.2. SECURITY MODELS IN CURRENT SMART DEVICES
- 2.3. MALWARE IN SMART DEVICES: EVOLUTION, CHARACTERIZATION AND EXAMPLES
- 2.4. MALWARE DETECTION AND ANALYSIS
- 3.1. INTRODUCTION
- 3.2. STATIC ANALYSIS
- 3.3. DYNAMIC ANALYSIS
- 3.4. CLOUD ANALYSIS AND CONSUMPTION METERING
- 3.5. ONLINET MARKETS AND MALWARE REPOSITORIES
- 4.1. INTRODUCTION
- 4.2. DATASET AND EXPERIMENTAL SETTING
- 4.3. ANALYSIS OF CODE STRUCTURES IN ANDROID MALWARE FAMILIES
- 4.4. MINING CODE CHUNKS IN MALWARE FAMILIES
- 4.5. CONCLUSIONS
- 5.1. INTRODUCTION
- 5.2. A DIFFERENTIAL FAULT ANALYSIS MODEL
- 5.3. ALTERDROID: DIFFERENTIAL FAULT ANALYSIS OF OBFUSCATED APPS
- 5.4. EVALUATION
- 5.5. CONCLUSIONS
- 6.1. INTRODUCTION
- 6.2. EXPERIMENTAL SETTING
- 6.3. ENERGY CONSUMPTION OF ANOMALY DETECTION COMPONENTS
- 6.4. DEPLOYMENT STRATEGIES AND TRADE-OFFS
- 6.5. CASE STUDY: A DETECTOR OF REPACKAGED MALWARE
- 6.6. CONCLUSIONS
- 7.1. INTRODUCTION
- 7.2. BEHAVIORAL MODELS
- 7.3. TARGETED TESTING IN THE CLOUD
- 7.4. CASE STUDIES
- 7.5. CONCLUSIONS
- 8.1. CONTRIBUTIONS
- 8.2. OPEN ISSUES AND FUTURE WORK
- 8.3. RESULTS