Hein, 2014 - Google Patents
Permission based malware protection model for android applicationHein, 2014
View PDF- Document ID
- 18095507461534175844
- Author
- Hein C
- Publication year
- Publication venue
- International Conference on Advances in Engineering and Technology
External Links
Snippet
Mobile malware performs malicious activities like stealing private information, sending sms, reading contacts and can even harm by exploiting data. Malwares are spreading around the world and infecting not only for end users but also for large organizations and service …
- 230000000694 effects 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Qamar et al. | Mobile malware attacks: Review, taxonomy & future directions | |
Talal et al. | Comprehensive review and analysis of anti-malware apps for smartphones | |
Arshad et al. | Android malware detection & protection: a survey | |
Chen et al. | Stormdroid: A streaminglized machine learning-based system for detecting android malware | |
Ozturk et al. | An Effective Strategy for Ransomware Mitigation on Android Devices via Android OS File System API | |
Suarez-Tangil et al. | Evolution, detection and analysis of malware for smart devices | |
Abawajy et al. | Identifying cyber threats to mobile-IoT applications in edge computing paradigm | |
Zhang et al. | Semantics-aware android malware classification using weighted contextual api dependency graphs | |
Alazab et al. | Analysis of malicious and benign android applications | |
Zhou et al. | Harvesting developer credentials in android apps | |
Anwar et al. | A static approach towards mobile botnet detection | |
Zaidi et al. | A survey on security for smartphone device | |
Martinelli et al. | I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of android malware | |
Kim et al. | Attack detection application with attack tree for mobile system using log analysis | |
US10860719B1 (en) | Detecting and protecting against security vulnerabilities in dynamic linkers and scripts | |
Sk | A literature review on android mobile malware detection using machine learning techniques | |
Kaushik et al. | Malware detection techniques in android | |
Louk et al. | An analysis of security system for intrusion in smartphone environment | |
Hein | Permission based malware protection model for android application | |
Gupta et al. | A risk-driven model to minimize the effects of human factors on smart devices | |
Dua et al. | Taxonomy: Mobile malware Threats and detection techniques | |
Zhang et al. | Android Application Security: A Semantics and Context-Aware Approach | |
Keteku et al. | Detection and Prevention of Malware in Android Mobile Devices: A Literature Review | |
Surendran et al. | Detection of malware applications in android smartphones | |
Gamao | Malware Analysis on Android Apps: A Permission-based Approach |