Registro sencillo

dc.rights.licenseAttribution 4.0 International*
dc.contributor.authorZurutuza, Urko
dc.contributor.authorUribeetxeberria, Roberto
dc.contributor.otherSomarriba Jarquin, Oscar Manuel
dc.contributor.otherDelosières, Laurent
dc.contributor.otherNadjm-Tehrani, Simin
dc.date.accessioned2022-04-01T13:49:12Z
dc.date.available2022-04-01T13:49:12Z
dc.date.issued2016
dc.identifier.issn2090-0147en
dc.identifier.otherhttps://katalogoa.mondragon.edu/janium-bin/janium_login_opac.pl?find&ficha_no=121892en
dc.identifier.urihttps://hdl.handle.net/20.500.11984/5521
dc.description.abstractMalware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code. The increasing number of malicious applications targeting Android devices raises the demand for analyzing them to find where the malcode is triggered when user interacts with them. In this paper a framework to monitor and visualize Android applications’ anomalous function calls is described. Our approach includes platformindependent application instrumentation, introducing hooks in order to trace restricted API functions used at runtime of the application. These function calls are collected at a central server where the application behavior filtering and a visualization take place. This can help Android malware analysts in visually inspecting what the application under study does, easily identifying such malicious functions.en
dc.language.isoengen
dc.publisherHindawi Publishing Corporationen
dc.rights© 2016 Oscar Somarriba et al.en
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.titleDetection and Visualization of Android Malware Behavioren
dcterms.accessRightshttp://purl.org/coar/access_right/c_abf2en
dcterms.sourceJournal of Electrical and Computer Engineeringen
local.contributor.groupAnálisis de datos y ciberseguridades
local.description.peerreviewedtrueen
local.identifier.doihttp://dx.doi.org/10.1155/2016/8034967en
local.contributor.otherinstitutionhttps://ror.org/05ynxx418en
local.contributor.otherinstitutionhttps://ror.org/00brc6r59es
local.source.detailsVol. 2016, Article ID 8034967. Hindawi, 2016en
oaire.format.mimetypeapplication/pdf
oaire.file$DSPACE\assetstore
oaire.resourceTypehttp://purl.org/coar/resource_type/c_6501en
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85en


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(es)

Registro sencillo

Attribution 4.0 International
Excepto si se señala otra cosa, la licencia del ítem se describe como Attribution 4.0 International