DETECTION OF HIDDEN FUNCTIONALITIES OF SMART PHONE MALWARE APP USING PATTERN-MATCHING TECHNIQUES

Abstract

Malware developers are progressively using advanced techniques to defeat malware detection tools. One such technique commonly observed in recent malware samples consists of hiding and obfuscating modules containing malicious functionality in places that static analysis tools overlook. In this paper, we describe a dynamic analysis approach for detecting such hidden or obfuscated malware components distributed as parts of an app package. The key idea is behavioral differences between the original app and a number of automatically generated versions of it, where a number of modifications (faults) have been carefully injected. The differential signature is analyzed through a pattern-matching process driven by rules that relate different types of hidden functionalities with patterns found in the signature. A thorough justification and a description of the proposed model are provided.

Authors and Affiliations

Keywords

Related Articles

APPLICATION OF GOOGLE EARTH IMAGE INFORMATION FOR IDENTIFY PHYSICAL AND CULTURAL FEATURES OF NORTHEASTERN BOUNDARY OF BANGLADESH ALIGNED WITH MEGHALAYA, EASTERN ASSAM AND TRIPURA

A frontier has a significant role of national boundary and security which is discussable matter for any country. Bangladesh and India share international border which is the fifth-longest land border in the world. In the...

EFFECTS OF STORAGE TEMPERATURE AND SUN LIGHT EXPOSURE ON SOME BOTTLED WATER MARKETED IN KIRKUK CITY, NORTH IRAQ

The study was conducted for assessing the effect of storage temperature and sun light exposure on four bottled water (A, B, C, D company) marketed in Kirkuk city, north Iraq during February 2017 to May 2017. Physicochemi...

A SURVEY STUDY OF SIZE FACTOR IMPACT ON TQM SUCCESS AND SUSTAINABILITY

Total Quality Management (TQM) is a management approach to long–term success through customer satisfaction. There have been numerous studies devoted to TQM success and failures but relatively few took into account size f...

OPTIMIZATION OF PID PARAMETERS BASED ON PARTICLE SWARM OPTIMIZATION FOR BALL AND BEAM SYSTEM

This paper introduces the application of an optimization technique, known as Particle Swarm Optimization (PSO) algorithm to the problem of tuning the Proportional-Integral-Derivative (PID) controller for a linearized bal...

ANALYSIS OF PRIORITY QUEUES WITH PENTAGON FUZZY NUMBER

Fuzziness is a sort of recent incoherence. Fuzzy set theory is asserted to depict vagueness. This study explores the queuing model of priority classes adopting pentagon fuzzy number with the inclusions of fuzzy set opera...

Download PDF file
  • EP ID EP421599
  • DOI 10.5281/zenodo.2281616
  • Views 99
  • Downloads 0

How To Cite

(2018). DETECTION OF HIDDEN FUNCTIONALITIES OF SMART PHONE MALWARE APP USING PATTERN-MATCHING TECHNIQUES. INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH, 5(11), 107-116. https://europub.co.uk/articles/-A-421599