PPT-RiskRanker : Scalable and Accurate Zero-day Android Malware Detection

Author : relylancome | Published Date : 2020-06-17

Grace M Zhou Y Shilong Z Jiang X RiskRanker analyses the paths within an android application Potentially malicious security risks are flagged for investigation

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "RiskRanker : Scalable and Accurate Zero-..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

RiskRanker : Scalable and Accurate Zero-day Android Malware Detection: Transcript


Grace M Zhou Y Shilong Z Jiang X RiskRanker analyses the paths within an android application Potentially malicious security risks are flagged for investigation Summary This application showcases how reverse engineering. 1 miles Android Malware Classification . Using Weighted . Contextual API Dependency . Graphs. Mu Zhang. Yue. . Duan. Heng. Yin. Zhiruo. Zhao. Department . of Electrical Engineering and . Computer Science. : Evaluating Android Anti-malware against Transformation . A. ttacks. Vaibhav . Rastogi. , . Yan Chen. , and . Xuxian. Jiang. 1. Lab for Internet and Security Technology, Northwestern University. †. Author : . Yajin. Zhou, . Xuxuan. Jiang. TJ. Index of this paper. Introduction. Malware Timeline. Malware Characterization. Malware Installation. Repackaging. Update Attack. Drive-by Download. Others. Connor Schnaith, Taiyo Sogawa. 9 April 2012. Motivation. “. 5. 000 . new. malware samples per day”. --David Perry of Trend Micro. Large variance between attacks. Polymorphic attacks . Perform the same function. : Evaluating Android Anti-malware against Transformation . A. ttacks. Vaibhav . Rastogi. , . Yan Chen. , and . Xuxian. Jiang. 1. Lab for Internet and Security Technology, Northwestern University. †. o. ‐day. . Android Malware Detection. Introduction/Motivation:. What was the main problem. . addressed?. . . . Mobile. . devices. . have become popular. . targets for malware. authors, threatening privacy, security, and finances.. Spam:. Spam is unsolicited or undesired electronic junk mail. Characteristics of spam are:. Mass . mailing to large number of recipients. Usually a commercial advertisement. Annoying but usually harmless unless coupled with a fraud based phishing scam . Outline. Introduction. Types . of Malware. Malware examples. How . Malware Spreads. Prevention. AndroRAT. Hands-on Lab. Introduction. Mobile Security has become a fast growing issue. Nearly 100,000 new malicious programs for mobile devices were detected in 2013 (Kaspersky Lab). and. Content Theft & Malware . Investigative Findings. 30%. 11.8. MILLION. U.S. users exposed to malware each month by sites in the sample content theft group. 1 in 3 content theft sites exposed users to malware . Neelima. Krishnan. Gayathri. Subramanian. Introduction. Why is Android Security Important ? . Security Model in Android. What we proposed and What we did. Implementation Details . Results and Conclusion. A. ttacks. Vaibhav . Rastogi. , . Yan Chen. , and . Xuxian. Jiang. 1. Lab for Internet and Security Technology, Northwestern University. †. North Carolina State University. Android Dominance. Smartphone sales already exceed PC sales. Fenghao. Xu, . Siyu. Shen, . Wenrui. . Diao. , Zhou Li , Yi Chen , Rui Li, . Kehuan. Zhang. The Chinese University of Hong Kong, Shandong University, University of California, Irvine. 2021 ACM SIGSAC Conference on Computer and Communications Security.

Download Document

Here is the link to download the presentation.
"RiskRanker : Scalable and Accurate Zero-day Android Malware Detection"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents