User-Centric Dependence Analysis For Identifying Malicious Mobile Apps
dc.contributor.author | Elish, Karim O. | en |
dc.contributor.author | Yao, Danfeng (Daphne) | en |
dc.contributor.author | Ryder, Barbara G. | en |
dc.contributor.department | Computer Science | en |
dc.date.accessioned | 2018-07-19T16:54:22Z | en |
dc.date.available | 2018-07-19T16:54:22Z | en |
dc.date.issued | 2012 | en |
dc.description.abstract | This paper describes an efficient approach for identifying malicious Android mobile applications through specialized static program analysis. Our solution performs offline analysis and enforces the normal properties of legitimate dataflow patterns to identify programs that violate these properties. To demonstrate the feasibility of our user-centric dependence analysis, we implement a tool to generate a data dependence graph and perform preliminary evaluation to characterize both legitimate and malicious Android apps. Our preliminary results confirm our hypothesis on the differences in user-centric data dependence behaviors between legitimate and malicious apps. | en |
dc.description.sponsorship | This work has been supported in part by Security and Software Engineering Research Center (S2ERC), a NSF sponsored multi-university Industry/ University Cooperative Research Center (I/UCRC). | en |
dc.identifier.uri | http://hdl.handle.net/10919/84191 | en |
dc.language.iso | en_US | en |
dc.publisher | IEEE | en |
dc.relation.ispartof | Workshop on Mobile Security Technologies 2012 | en |
dc.rights | In Copyright | en |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en |
dc.title | User-Centric Dependence Analysis For Identifying Malicious Mobile Apps | en |
dc.type | Conference proceeding | en |
dc.type | Presentation | en |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- ElishMaliciousMobile2012.pdf
- Size:
- 166.35 KB
- Format:
- Adobe Portable Document Format
- Description: