Survey of dynamic anti-analysis schemes for mobile malware
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lim, J. | - |
dc.contributor.author | Shin, Y. | - |
dc.contributor.author | Lee, S. | - |
dc.contributor.author | Kim, K. | - |
dc.contributor.author | YI, JEONG HYUN | - |
dc.date.available | 2019-04-02T10:30:01Z | - |
dc.date.created | 2019-04-02 | - |
dc.date.issued | 2018-09 | - |
dc.identifier.issn | 2093-5374 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/32302 | - |
dc.description.abstract | With the development of the smartphone market, the smartphone application market will grow significantly. As a result, malicious code targeting smartphones is increasing exponentially. Attackers are spreading malicious apps by embedding malicious code in the app through repackaging attacks. Small-scale payment fraud and malicious files for smart banking also skyrocketed through smishing attack targeting Android smartphone users. The intelligent attack, which refers to the type of target attack, has also become fully visible. In the future, mobile payment and electronic financial crime targeting smartphone users are expected to become more popular through malicious files based on Android spreading through smishing attack and it is predicted that various irregular mobile security threats will come true. To prepare for such attacks, several analytical tools have been developed, including a sandbox tool that can analyze Android malicious apps. However, as in PC environment, we anticipate the emergence of anti-analysis schemes that can neutralize these analytical tools. Therefore, this paper analyzes the anti-analysis schemes applied to malicious applications. By supporting the analysis of malicious applications based on the results of this work, it will be very helpful to reduce the research cost of malicious code research and to create a secure smartphone security environment. © 2019, Innovative Information Science and Technology Research Group. All rights reserved. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Innovative Information Science and Technology Research Group | - |
dc.relation.isPartOf | Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications | - |
dc.title | Survey of dynamic anti-analysis schemes for mobile malware | - |
dc.type | Article | - |
dc.identifier.doi | 10.22667/JOWUA.2018.09.30.039 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, v.9, no.3, pp.39 - 49 | - |
dc.description.journalClass | 1 | - |
dc.identifier.scopusid | 2-s2.0-85059506852 | - |
dc.citation.endPage | 49 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 39 | - |
dc.citation.title | Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications | - |
dc.citation.volume | 9 | - |
dc.contributor.affiliatedAuthor | YI, JEONG HYUN | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.subject.keywordAuthor | Anti-debugging | - |
dc.subject.keywordAuthor | Anti-emulating | - |
dc.subject.keywordAuthor | Anti-rooting | - |
dc.subject.keywordAuthor | Mobile code reversing | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.