Structural analysis of packing schemes for extracting hidden codes in mobile malware
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lim, Jongsu | - |
dc.contributor.author | Yi, Jeong Hyun | - |
dc.date.available | 2018-05-09T02:25:04Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2016-09-15 | - |
dc.identifier.issn | 1687-1499 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/7504 | - |
dc.description.abstract | In the Internet of Things service environment where all things are connected, mobile devices will become an extremely important medium linking together things with built-in heterogeneous communication functions. If a mobile device is exposed to hacking in this context, a security threat arises where all things linked to the device become targets of cyber hacking; therefore, greater emphasis will be placed on the demand for swift mobile malware detection and countermeasures. Such mobile malware applies advanced code-hiding schemes to ensure that the part of the code that executes malicious behavior is not detected by an anti-virus software. In order to detect mobile malware, we must first conduct structural analysis of their code-hiding schemes. In this paper, we analyze the structure of the two representative Android-based code-hiding tools, Bangcle and DexProtector, and then introduce a method and procedure for extracting the hidden original code. We also present experimental results of applying these tools on sample malicious codes. | - |
dc.publisher | SPRINGER INTERNATIONAL PUBLISHING AG | - |
dc.relation.isPartOf | EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING | - |
dc.title | Structural analysis of packing schemes for extracting hidden codes in mobile malware | - |
dc.type | Article | - |
dc.identifier.doi | 10.1186/s13638-016-0720-3 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, pp.1 - 12 | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000383565200001 | - |
dc.identifier.scopusid | 2-s2.0-84988432691 | - |
dc.citation.endPage | 12 | - |
dc.citation.startPage | 1 | - |
dc.citation.title | EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING | - |
dc.contributor.affiliatedAuthor | Yi, Jeong Hyun | - |
dc.type.docType | Article | - |
dc.description.oadoiVersion | published | - |
dc.subject.keywordAuthor | Repackaging attack | - |
dc.subject.keywordAuthor | Android app security | - |
dc.subject.keywordAuthor | Mobile code hiding | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.