DETECTION OF HIDDEN FUNCTIONALITIES OF SMART PHONE MALWARE APP USING PATTERN-MATCHING TECHNIQUES
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH - Year 2018, Vol 5, Issue 11
Abstract
Malware developers are progressively using advanced techniques to defeat malware detection tools. One such technique commonly observed in recent malware samples consists of hiding and obfuscating modules containing malicious functionality in places that static analysis tools overlook. In this paper, we describe a dynamic analysis approach for detecting such hidden or obfuscated malware components distributed as parts of an app package. The key idea is behavioral differences between the original app and a number of automatically generated versions of it, where a number of modifications (faults) have been carefully injected. The differential signature is analyzed through a pattern-matching process driven by rules that relate different types of hidden functionalities with patterns found in the signature. A thorough justification and a description of the proposed model are provided.
APPLICATION OF GOOGLE EARTH IMAGE INFORMATION FOR IDENTIFY PHYSICAL AND CULTURAL FEATURES OF NORTHEASTERN BOUNDARY OF BANGLADESH ALIGNED WITH MEGHALAYA, EASTERN ASSAM AND TRIPURA
A frontier has a significant role of national boundary and security which is discussable matter for any country. Bangladesh and India share international border which is the fifth-longest land border in the world. In the...
EFFECTS OF STORAGE TEMPERATURE AND SUN LIGHT EXPOSURE ON SOME BOTTLED WATER MARKETED IN KIRKUK CITY, NORTH IRAQ
The study was conducted for assessing the effect of storage temperature and sun light exposure on four bottled water (A, B, C, D company) marketed in Kirkuk city, north Iraq during February 2017 to May 2017. Physicochemi...
A SURVEY STUDY OF SIZE FACTOR IMPACT ON TQM SUCCESS AND SUSTAINABILITY
Total Quality Management (TQM) is a management approach to long–term success through customer satisfaction. There have been numerous studies devoted to TQM success and failures but relatively few took into account size f...
OPTIMIZATION OF PID PARAMETERS BASED ON PARTICLE SWARM OPTIMIZATION FOR BALL AND BEAM SYSTEM
This paper introduces the application of an optimization technique, known as Particle Swarm Optimization (PSO) algorithm to the problem of tuning the Proportional-Integral-Derivative (PID) controller for a linearized bal...
ANALYSIS OF PRIORITY QUEUES WITH PENTAGON FUZZY NUMBER
Fuzziness is a sort of recent incoherence. Fuzzy set theory is asserted to depict vagueness. This study explores the queuing model of priority classes adopting pentagon fuzzy number with the inclusions of fuzzy set opera...