Demystifying Hidden Sensitive Operations in Android apps; ; et al in ACM Transactions on Software Engineering and Methodology (2022) Detailed reference viewed: 91 (3 UL) On the Impact of Sample Duplication in Machine Learning based Android Malware Detection; ; et al in ACM Transactions on Software Engineering and Methodology (2021), 30(3), 1-38 Detailed reference viewed: 96 (0 UL) On Locating Malicious Code in Piggybacked Android AppsLi, Li ; Li, Daoyuan ; Bissyande, Tegawendé François D Assise et alin Journal of Computer Science and Technology (2017) To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to ... [more ▼] To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth of piggybacked apps, we are able to automatically locate the malicious packages from piggybacked Android apps with an accuracy@5 of 83.6% for such packages that are triggered through method invocations and an accuracy@5 of 82.2% for such packages that are triggered independently. [less ▲] Detailed reference viewed: 290 (10 UL) Automatically Locating Malicious Packages in Piggybacked Android AppsLi, Li ; Li, Daoyuan ; Bissyande, Tegawendé François D Assise et alin Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017) (2017, May) To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to ... [more ▼] To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth set of piggybacked apps, we are able to automatically locate the malicious packages from piggybacked Android apps with an accuracy of 83.6% in verifying the top five reported items. [less ▲] Detailed reference viewed: 372 (23 UL) |
||