Ontology type: schema:ScholarlyArticle
2015-02
AUTHORSVitor Monte Afonso, Matheus Favero de Amorim, André Ricardo Abed Grégio, Glauco Barroso Junquera, Paulo Lício de Geus
ABSTRACTThe constant evolution of mobile devices’ resources and features turned ordinary phones into powerful and portable computers, leading their users to perform payments, store sensitive information and even to access other accounts on remote machines. This scenario has contributed to the rapid rise of new malware samples targeting mobile platforms. Given that Android is the most widespread mobile operating system and that it provides more options regarding application markets (official and alternative stores), it has been the main target for mobile malware. As such, markets that publish Android applications have been used as a point of infection for many users, who unknowingly download some popular applications that are in fact disguised malware. Hence, there is an urge for techniques to analyze and identify malicious applications before they are published and able to harm users. In this article, we present a system to dynamically identify whether an Android application is malicious or not, based on machine learning and features extracted from Android API calls and system call traces. We evaluated our system with 7,520 apps, 3,780 for training and 3,740 for testing, and obtained a detection rate of 96.66 %. More... »
PAGES9-17
http://scigraph.springernature.com/pub.10.1007/s11416-014-0226-7
DOIhttp://dx.doi.org/10.1007/s11416-014-0226-7
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1019956480
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Communications Technologies",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Technology",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "State University of Campinas",
"id": "https://www.grid.ac/institutes/grid.411087.b",
"name": [
"University of Campinas, Campinas, SP, Brazil"
],
"type": "Organization"
},
"familyName": "Afonso",
"givenName": "Vitor Monte",
"id": "sg:person.010336470207.20",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010336470207.20"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "State University of Campinas",
"id": "https://www.grid.ac/institutes/grid.411087.b",
"name": [
"University of Campinas, Campinas, SP, Brazil"
],
"type": "Organization"
},
"familyName": "de Amorim",
"givenName": "Matheus Favero",
"type": "Person"
},
{
"affiliation": {
"alternateName": "State University of Campinas",
"id": "https://www.grid.ac/institutes/grid.411087.b",
"name": [
"University of Campinas, Campinas, SP, Brazil"
],
"type": "Organization"
},
"familyName": "Gr\u00e9gio",
"givenName": "Andr\u00e9 Ricardo Abed",
"id": "sg:person.013601035005.37",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013601035005.37"
],
"type": "Person"
},
{
"affiliation": {
"name": [
"Samsung Institute for Informatics Development (SIDI), Campinas, SP, Brazil"
],
"type": "Organization"
},
"familyName": "Junquera",
"givenName": "Glauco Barroso",
"type": "Person"
},
{
"affiliation": {
"alternateName": "State University of Campinas",
"id": "https://www.grid.ac/institutes/grid.411087.b",
"name": [
"University of Campinas, Campinas, SP, Brazil"
],
"type": "Organization"
},
"familyName": "de Geus",
"givenName": "Paulo L\u00edcio",
"id": "sg:person.011761136731.35",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011761136731.35"
],
"type": "Person"
}
],
"citation": [
{
"id": "https://doi.org/10.1145/2046614.2046618",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1004604643"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1145/2307636.2307663",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1008463837"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1145/2381934.2381950",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1008630506"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-33018-6_30",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1024617733",
"https://doi.org/10.1007/978-3-642-33018-6_30"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1145/1656274.1656278",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1028526411"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1145/2480362.2480701",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1033547244"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/acsac.2007.21",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1093515115"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/malware.2010.5665792",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094002064"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/sp.2012.16",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094209237"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/msn.2012.43",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094434630"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/trustcom.2013.25",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095474597"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/asiajcis.2012.18",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095607224"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.14722/ndss.2014.23247",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095872940"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.14722/ndss.2014.23328",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095872955"
],
"type": "CreativeWork"
}
],
"datePublished": "2015-02",
"datePublishedReg": "2015-02-01",
"description": "The constant evolution of mobile devices\u2019 resources and features turned ordinary phones into powerful and portable computers, leading their users to perform payments, store sensitive information and even to access other accounts on remote machines. This scenario has contributed to the rapid rise of new malware samples targeting mobile platforms. Given that Android is the most widespread mobile operating system and that it provides more options regarding application markets (official and alternative stores), it has been the main target for mobile malware. As such, markets that publish Android applications have been used as a point of infection for many users, who unknowingly download some popular applications that are in fact disguised malware. Hence, there is an urge for techniques to analyze and identify malicious applications before they are published and able to harm users. In this article, we present a system to dynamically identify whether an Android application is malicious or not, based on machine learning and features extracted from Android API calls and system call traces. We evaluated our system with 7,520 apps, 3,780 for training and 3,740 for testing, and obtained a detection rate of 96.66 %.",
"genre": "research_article",
"id": "sg:pub.10.1007/s11416-014-0226-7",
"inLanguage": [
"en"
],
"isAccessibleForFree": false,
"isPartOf": [
{
"id": "sg:journal.1136175",
"issn": [
"2274-2042",
"1772-9904"
],
"name": "Journal of Computer Virology and Hacking Techniques",
"type": "Periodical"
},
{
"issueNumber": "1",
"type": "PublicationIssue"
},
{
"type": "PublicationVolume",
"volumeNumber": "11"
}
],
"name": "Identifying Android malware using dynamically obtained features",
"pagination": "9-17",
"productId": [
{
"name": "readcube_id",
"type": "PropertyValue",
"value": [
"5f15b6e81700c0ae92da8909261f1601694c1143f5810b36ae6b8a248f93459a"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/s11416-014-0226-7"
]
},
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1019956480"
]
}
],
"sameAs": [
"https://doi.org/10.1007/s11416-014-0226-7",
"https://app.dimensions.ai/details/publication/pub.1019956480"
],
"sdDataset": "articles",
"sdDatePublished": "2019-04-10T18:22",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8675_00000521.jsonl",
"type": "ScholarlyArticle",
"url": "http://link.springer.com/10.1007%2Fs11416-014-0226-7"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11416-014-0226-7'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11416-014-0226-7'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11416-014-0226-7'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11416-014-0226-7'
This table displays all metadata directly associated to this object as RDF triples.
132 TRIPLES
21 PREDICATES
41 URIs
19 LITERALS
7 BLANK NODES