scholarly journals On the Limits of Information Flow Techniques for Malware Analysis and Containment

Author(s):  
Lorenzo Cavallaro ◽  
Prateek Saxena ◽  
R. Sekar
1995 ◽  
Vol 33 (4) ◽  
pp. 52-64 ◽  
Author(s):  
Huan Neng Chiu

2017 ◽  
Vol 8 (1) ◽  
pp. 28-42
Author(s):  
Lina M. Jimenez ◽  
Martin Ochoa ◽  
Sandra J. Rueda

Android stores and users need mechanisms to evaluate whether their applications are secure or not. Although various previous works use data and control flow techniques to evaluate security features of Android applications, this paper extends those works by using Jif to verify compliance of information flow policies. To do so, the authors addressed some challenges that emerge in Android environments, like automatizing generation of Jif labels for Android applications, and defining translations for Java instructions that are not currently supported by the Jif compiler. Results show that a Jif-based analysis is faster and has a better recall than other available mechanisms, but it also has a slightly lower precision. Jif also provides an open source compiler, generates executable code for an application only if such application meets a defined policy, and checks implicit flows which may be relevant for highly sensitive applications.


2012 ◽  
Vol 2 (6) ◽  
pp. 101-104
Author(s):  
Leenu Singh Leenu Singh ◽  
◽  
Syed Imtiyaz Hassan
Keyword(s):  

Author(s):  
Raditya Faisal Waliulu ◽  
Teguh Hidayat Iskandar Alam

At this paper focus on Malicous Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successfull user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and dissambler body malware.Keyword : forensic malware, Analysis, Advance Presistent Threat, Cyberwar, dissambler


Sign in / Sign up

Export Citation Format

Share Document