Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
Articles 1 - 3 of 3
Full-Text Articles in Information Security
Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu
Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Software repackaging is a common approach for creating malware. In this approach, malware authors inject malicious payloads into legitimate applications; then, to ren- der security analysis more difficult, they obfuscate most or all of the code. This forces analysts to spend a large amount of effort filtering out benign obfuscated methods in order to locate potentially malicious methods for further analysis. If an effective mechanism for filtering out benign obfuscated methods were available, the number of methods that must be analyzed could be reduced, allowing analysts to be more productive. In this thesis, we introduce SEMEO, a highly effective and …
Significant Permission Identification For Android Malware Detection, Lichao Sun
Significant Permission Identification For Android Malware Detection, Lichao Sun
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
A recent report indicates that a newly developed malicious app for Android is introduced every 11 seconds. To combat this alarming rate of malware creation, we need a scalable malware detection approach that is effective and efficient. In this thesis, we introduce SigPID, a malware detection system based on permission analysis to cope with the rapid increase in the number of Android malware. Instead of analyzing all 135 Android permissions, our approach applies 3-level pruning by mining the permission data to identify only significant permissions that can be effective in distinguishing benign and malicious apps. Based on the identified significant …
The Unforeseen Evolution Of Technology, Dylan White
The Unforeseen Evolution Of Technology, Dylan White
Nebraska College Preparatory Academy: Senior Capstone Projects
Technology has evolved in the past two decades to alter how countries and their people live in the present day. Said technology has also both solved and created new problems for world powers (i.e. the U.S. and China) to face. Issues of cyber security and cyber surveillance are already potential problems that need to be addressed, where topics like cyber warfare need to be closely monitored with time. All of these are potentially underestimated threats to civil liberties, and to countries in their entirety.
I agree with the findings in my project… • The United States is a model to …