Detailed Information

Cited 0 time in webofscience Cited 1 time in scopus
Metadata Downloads

Survey of dynamic anti-analysis schemes for mobile malware

Full metadata record
DC Field Value Language
dc.contributor.authorLim, J.-
dc.contributor.authorShin, Y.-
dc.contributor.authorLee, S.-
dc.contributor.authorKim, K.-
dc.contributor.authorYI, JEONG HYUN-
dc.date.available2019-04-02T10:30:01Z-
dc.date.created2019-04-02-
dc.date.issued2018-09-
dc.identifier.issn2093-5374-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/32302-
dc.description.abstractWith the development of the smartphone market, the smartphone application market will grow significantly. As a result, malicious code targeting smartphones is increasing exponentially. Attackers are spreading malicious apps by embedding malicious code in the app through repackaging attacks. Small-scale payment fraud and malicious files for smart banking also skyrocketed through smishing attack targeting Android smartphone users. The intelligent attack, which refers to the type of target attack, has also become fully visible. In the future, mobile payment and electronic financial crime targeting smartphone users are expected to become more popular through malicious files based on Android spreading through smishing attack and it is predicted that various irregular mobile security threats will come true. To prepare for such attacks, several analytical tools have been developed, including a sandbox tool that can analyze Android malicious apps. However, as in PC environment, we anticipate the emergence of anti-analysis schemes that can neutralize these analytical tools. Therefore, this paper analyzes the anti-analysis schemes applied to malicious applications. By supporting the analysis of malicious applications based on the results of this work, it will be very helpful to reduce the research cost of malicious code research and to create a secure smartphone security environment. © 2019, Innovative Information Science and Technology Research Group. All rights reserved.-
dc.language영어-
dc.language.isoen-
dc.publisherInnovative Information Science and Technology Research Group-
dc.relation.isPartOfJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications-
dc.titleSurvey of dynamic anti-analysis schemes for mobile malware-
dc.typeArticle-
dc.identifier.doi10.22667/JOWUA.2018.09.30.039-
dc.type.rimsART-
dc.identifier.bibliographicCitationJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, v.9, no.3, pp.39 - 49-
dc.description.journalClass1-
dc.identifier.scopusid2-s2.0-85059506852-
dc.citation.endPage49-
dc.citation.number3-
dc.citation.startPage39-
dc.citation.titleJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications-
dc.citation.volume9-
dc.contributor.affiliatedAuthorYI, JEONG HYUN-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.subject.keywordAuthorAnti-debugging-
dc.subject.keywordAuthorAnti-emulating-
dc.subject.keywordAuthorAnti-rooting-
dc.subject.keywordAuthorMobile code reversing-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > School of Software > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher YI, JEONG HYUN photo

YI, JEONG HYUN
College of Information Technology (School of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE