• MADAM

  • Referenced in 4 articles [sw38765]
  • MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention. Android users are constantly ... malicious applications (apps), generically called malware. Malware constitutes a serious threat to user privacy, money ... present MADAM, a novel host-based malware detection system for Android devices which simultaneously analyzes ... application, user and package, to detect and stop malicious behaviors. MADAM has been specifically designed...
  • Panorama

  • Referenced in 3 articles [sw23936]
  • flow for malware detection and analysis. Malicious programs spy on users’ behavior and compromise their ... undesirable actions. Unfortunately, existing techniques for detecting malware and analyzing unknown code samples are insufficient ... access and processing behavior is the fundamental trait of numerous malware categories breaching users’ privacy ... extensive experiments, Panorama successfully detected all the malware samples and had very few false positives...
  • DeepXplore

  • Referenced in 7 articles [sw41847]
  • malware detection, where the correctness and predictability of a system’s behavior for corner case ... therefore often fails to expose erroneous behaviors for rare inputs. We design, implement, and evaluate ... systems that both trigger many differential behaviors and achieve high neuron coverage can be represented ... corner case behaviors (e.g., self-driving cars crashing into guard rails and malware masquerading...
  • Andromaly

  • Referenced in 0 articles [sw23485]
  • Andromaly: a behavioral malware detection framework for android devices. This article presents Andromaly - a framework...
  • FIRMA

  • Referenced in 2 articles [sw23934]
  • collected malware into families and generate behavioral signatures for their detection. Among these, network traffic ... network traffic obtained by executing unlabeled malware binaries, generates a clustering of the malware binaries...
  • TTAnalyze

  • Referenced in 6 articles [sw18511]
  • step to be able to develop effective detection techniques for malicious code. In addition ... tools that can thoroughlydelete malware from an infected machine. Traditionally, malware analysis has been ... TTAnalyze, a tool for dynamically analyzing the behavior of Windows executables. To this ... getting an understanding of the behavior of an unknown malware...
  • ARTDroid

  • Referenced in 1 article [sw38764]
  • developed to detect and analyze Android malware. Some advanced Android malware can use Java reflection ... their malicious behaviors for static analysis. Furthermore, for dynamic analysis, emulator detection and integrity selfchecking ... used by Android malware to bypass all recent Android sandboxes. In this paper, we propose...
  • BPFroid

  • Referenced in 1 article [sw38744]
  • malware detection methods and demonstrate its usage by developing novel signatures to detect suspicious behavior...
  • PoMMaDe

  • Referenced in 2 articles [sw37540]
  • PoMMaDe: pushdown model-checking for malware detection. We present PoMMaDe, a Pushd own Model-checking ... stack of the program, and malicious behaviors are specified in SCTPL or SLTPL, where SCTPL ... over the stack (needed for malware specification). The malware detection problem is reduced to SCTPL/SLTPL...
  • MARD

  • Referenced in 0 articles [sw21509]
  • makes malware difficult to detect in real-time and generally requires a behavioral signature ... framework called MARD for Metamorphic Malware Analysis and Real-Time Detection, to protect...
  • DroidMat

  • Referenced in 2 articles [sw33515]
  • static analyst paradigm for detecting the Android malware. The mechanism considers the static information including ... calls for characterizing the Android applications behavior. In order to recognize different intentions of Android...
  • BinSim

  • Referenced in 1 article [sw31767]
  • software plagiarism detection and malware lineage inference. Especially when analyzing malware variants, pervasive code obfuscation ... Existing ways rely on either comparing runtime behaviors or modeling code snippet semantics with symbolic ... instructions that impact on the observable behaviors. Our approach improves existing semantics-based binary diffing ... whether two executable binaries’ behaviors are conditionally equivalent; 2) detecting the similarities or differences, whose...
  • MadDroid

  • Referenced in 1 article [sw33522]
  • MadDroid: Characterising and Detecting Devious Ad Content for Android Apps. Advertisement drives the economy ... propagating malware and undesirable contents. To understand the practice of these devious ad behaviors ... devious ad contents, including five kinds of behaviors belonging to two categories: emph{ad loading ... propose MadDroid, a framework for automated detection of devious ad contents. MadDroid leverages an automated...
  • SEEAD

  • Referenced in 1 article [sw31769]
  • malware developers to escape from malware detection and to thwart the reverse engineering effort ... software execution paths and behavior will be exposed at specific profiling runs. As a result...
  • BotFlex

  • Referenced in 0 articles [sw21736]
  • works equally well for detection of general Internet malware. This is because BotFlex has been ... previously observed to be engaged in ’bad’ behavior...
  • Simulink

  • Referenced in 815 articles [sw04348]
  • Simulink® is an environment for multidomain simulation and...
  • LIBSVM

  • Referenced in 1184 articles [sw04879]
  • LIBSVM is a library for Support Vector Machines...
  • DART

  • Referenced in 74 articles [sw07260]
  • DART: directed automated random testing. We present a...
  • Soot

  • Referenced in 29 articles [sw09122]
  • Soot - a Java bytecode optimization framework. This paper...