Malware detection in smart phones based on graph invariants (Record no. 5048)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02837nam a22001817a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20220107122810.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 160329b xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Sumisha Joseph (93613034) |
| 9 (RLIN) | 8764 |
| 245 ## - TITLE STATEMENT | |
| Title | Malware detection in smart phones based on graph invariants |
| 502 ## - DISSERTATION NOTE | |
| Degree type | Master of Science in Computer Science and Information security |
| Name of granting institution | 2013-2015 |
| Year degree granted | INT |
| -- | Tony Thomas |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | As new malwares are appearing at an increasingly alarming rate, the need for automated techniques for identifying malicious behavior is a critical problem and at the same time a scopeful domain too. Malware for smart phones have sky-rocketed these last years, particularly for Android platforms. Contemporary malware makes extensive use of different techniques such as packing, code obfuscation, polymorphism, and metamorphism, to evade signature-based detection. Traditional signature-based detection technique is hard to catch up with latest malware or unknown malware. Behavior-based detection models are being investigated as a new methodology to defeat malware. This approach typically relies on system call sequences/graphs to model a malicious specification/pattern. In this project we try to capitalize on graph theoretic approach for analysis of application behavior as a means for detecting malware in the Android platform.<br/><br/>The sharp increase in the number of smartphones on the market, with the Android platform posed to becoming a market leader makes the need for malware detection on this platform an urgent issue. This particular piece of work proposes a method for detecting malwares by collecting both benign and malicious applications from the research market and thereafter performing a series of experiments on these applications for designing system call dependency graphs. These graphs are designed on the basis of sequence of communication between system calls, which in turn is obtained by running the binary executable in a virtual device. The result obtained by observing and comparing these system call dependency graphs behaves as a profile for the detection of upcoming malwares. These observations are derived purely in accordance with graph invariants, based on the graph theoretic approach. So here we introduce a new approach which is experimentally proven and has the potential for discovering new malware, because new malwares are constructed by adding new behaviors to existing malware. This work introduces a much advanced approach for detecting malware in Android phones with greater clarity. Using insights from this approach, a new naïve behavior based malware detection scheme can be build that could complement existing detection schemes.<br/> |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | COMPUTER SECURITY |
| 9 (RLIN) | 8765 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | MALWARE DETECTION |
| 9 (RLIN) | 8766 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | ANDROID |
| 9 (RLIN) | 8767 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | IIITM-K | Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre | 29/03/2016 | R-733 | 29/03/2016 | 29/03/2016 | Project Reports |