Malware detection in smart phones based on graph invariants (Record no. 5048)

MARC details
000 -LEADER
fixed length control field 02837nam a22001817a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220107122810.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160329b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Transcribing agency
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Sumisha Joseph (93613034)
9 (RLIN) 8764
245 ## - TITLE STATEMENT
Title Malware detection in smart phones based on graph invariants
502 ## - DISSERTATION NOTE
Degree type Master of Science in Computer Science and Information security
Name of granting institution 2013-2015
Year degree granted INT
-- Tony Thomas
520 ## - SUMMARY, ETC.
Summary, etc. As new malwares are appearing at an increasingly alarming rate, the need for automated techniques for identifying malicious behavior is a critical problem and at the same time a scopeful domain too. Malware for smart phones have sky-rocketed these last years, particularly for Android platforms. Contemporary malware makes extensive use of different techniques such as packing, code obfuscation, polymorphism, and metamorphism, to evade signature-based detection. Traditional signature-based detection technique is hard to catch up with latest malware or unknown malware. Behavior-based detection models are being investigated as a new methodology to defeat malware. This approach typically relies on system call sequences/graphs to model a malicious specification/pattern. In this project we try to capitalize on graph theoretic approach for analysis of application behavior as a means for detecting malware in the Android platform.<br/><br/>The sharp increase in the number of smartphones on the market, with the Android platform posed to becoming a market leader makes the need for malware detection on this platform an urgent issue. This particular piece of work proposes a method for detecting malwares by collecting both benign and malicious applications from the research market and thereafter performing a series of experiments on these applications for designing system call dependency graphs. These graphs are designed on the basis of sequence of communication between system calls, which in turn is obtained by running the binary executable in a virtual device. The result obtained by observing and comparing these system call dependency graphs behaves as a profile for the detection of upcoming malwares. These observations are derived purely in accordance with graph invariants, based on the graph theoretic approach. So here we introduce a new approach which is experimentally proven and has the potential for discovering new malware, because new malwares are constructed by adding new behaviors to existing malware. This work introduces a much advanced approach for detecting malware in Android phones with greater clarity. Using insights from this approach, a new naïve behavior based malware detection scheme can be build that could complement existing detection schemes.<br/>
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER SECURITY
9 (RLIN) 8765
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element MALWARE DETECTION
9 (RLIN) 8766
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element ANDROID
9 (RLIN) 8767
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     IIITM-K Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre 29/03/2016   R-733 29/03/2016 29/03/2016 Project Reports