REDIR: Automated static detection of obfuscated anti-debugging techniques

Author(s):  
Adam J. Smith ◽  
Robert F. Mills ◽  
Adam R. Bryant ◽  
Gilbert L. Peterson ◽  
Michael R. Grimaila
Keyword(s):  
2009 ◽  
Vol 29 (5) ◽  
pp. 1376-1379 ◽  
Author(s):  
Bai-qiang CHEN ◽  
Tao GUO ◽  
Hui RUAN ◽  
Jun YAN

2011 ◽  
Vol 30 (12) ◽  
pp. 3349-3353 ◽  
Author(s):  
Jia-xing LU ◽  
Fan GUO ◽  
Min YU
Keyword(s):  

Entropy ◽  
2021 ◽  
Vol 23 (2) ◽  
pp. 174
Author(s):  
Hongzhaoning Kang ◽  
Gang Liu ◽  
Zhengping Wu ◽  
Yumin Tian ◽  
Lizhi Zhang

Android devices are currently widely used in many fields, such as automatic control, embedded systems, the Internet of Things and so on. At the same time, Android applications (apps) always use multiple permissions, and permissions can be abused by malicious apps that disclose users’ privacy or breach the secure storage of information. FlowDroid has been extensively studied as a novel and highly precise static taint analysis for Android applications. Aiming at the problem of complex detection and false alarms in FlowDroid, an improved static detection method based on feature permission and risk rating is proposed. Firstly, the Chi-square test is used to extract correlated permissions related to malicious apps, and mutual information is used to cluster the permissions to generate feature permission clusters. Secondly, risk calculation method based on permissions and combinations of permissions are proposed to identify dangerous data flows. Experiments show that this method can significantly improve detection efficiency while maintaining the accuracy of dangerous data flow detection.


2010 ◽  
Vol 34 (3) ◽  
pp. 149-155 ◽  
Author(s):  
Chris Wysopal ◽  
Chris Eng ◽  
Tyler Shields
Keyword(s):  

Author(s):  
Farima Farmahinifarahani ◽  
Yadong Lu ◽  
Vaibhav Saini ◽  
Pierre Baldi ◽  
Cristina Lopes

Sign in / Sign up

Export Citation Format

Share Document