[go: up one dir, main page]

Hein, 2014 - Google Patents

Permission based malware protection model for android application

Hein, 2014

View PDF
Document ID
18095507461534175844
Author
Hein C
Publication year
Publication venue
International Conference on Advances in Engineering and Technology

External Links

Snippet

Mobile malware performs malicious activities like stealing private information, sending sms, reading contacts and can even harm by exploiting data. Malwares are spreading around the world and infecting not only for end users but also for large organizations and service …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Similar Documents

Publication Publication Date Title
Qamar et al. Mobile malware attacks: Review, taxonomy & future directions
Talal et al. Comprehensive review and analysis of anti-malware apps for smartphones
Arshad et al. Android malware detection & protection: a survey
Chen et al. Stormdroid: A streaminglized machine learning-based system for detecting android malware
Ozturk et al. An Effective Strategy for Ransomware Mitigation on Android Devices via Android OS File System API
Suarez-Tangil et al. Evolution, detection and analysis of malware for smart devices
Abawajy et al. Identifying cyber threats to mobile-IoT applications in edge computing paradigm
Zhang et al. Semantics-aware android malware classification using weighted contextual api dependency graphs
Alazab et al. Analysis of malicious and benign android applications
Zhou et al. Harvesting developer credentials in android apps
Anwar et al. A static approach towards mobile botnet detection
Zaidi et al. A survey on security for smartphone device
Martinelli et al. I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of android malware
Kim et al. Attack detection application with attack tree for mobile system using log analysis
US10860719B1 (en) Detecting and protecting against security vulnerabilities in dynamic linkers and scripts
Sk A literature review on android mobile malware detection using machine learning techniques
Kaushik et al. Malware detection techniques in android
Louk et al. An analysis of security system for intrusion in smartphone environment
Hein Permission based malware protection model for android application
Gupta et al. A risk-driven model to minimize the effects of human factors on smart devices
Dua et al. Taxonomy: Mobile malware Threats and detection techniques
Zhang et al. Android Application Security: A Semantics and Context-Aware Approach
Keteku et al. Detection and Prevention of Malware in Android Mobile Devices: A Literature Review
Surendran et al. Detection of malware applications in android smartphones
Gamao Malware Analysis on Android Apps: A Permission-based Approach