Proceedings of the 2015 International Conference on Education, Management, Information and Medicine

A Method of Malicous Application Detection

Authors
Xiao Cheng, Yanhui Guo, Qi Li
Corresponding Author
Xiao Cheng
Available Online April 2015.
DOI
https://doi.org/10.2991/emim-15.2015.115How to use a DOI?
Keywords
Malware detection; Data analysis optimization; Path optimization; Symbolic computation; Stream tracing
Abstract

With the rapid development of broadband wireless access technology and mobile terminal, the mobile internet developed quickly in recent years. However, malicious applications have become one of the key factors threatening the development of mobile internet. In order to protect vital interest of mobile terminal users, mobile malicious applications should be effectively prevented and controlled. This paper analyzes the existence limitation of current mobile application detection technology and uses symbolic execution on the base of stream tracing. Malicious code writers usually hide malicious code execution path, and in some special circumstances to trigger some malicious behaviors. We constraint solve execution routes with sensitive calls, and ultimately solve the specific backstage behaviors and trigger conditions. We did some experiments to evaluate the performance of the proposed method. The experimental results show that our method can work well.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 International Conference on Education, Management, Information and Medicine
Series
Advances in Economics, Business and Management Research
Publication Date
April 2015
ISBN
978-94-62520-68-4
ISSN
2352-5428
DOI
https://doi.org/10.2991/emim-15.2015.115How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Xiao Cheng
AU  - Yanhui Guo
AU  - Qi Li
PY  - 2015/04
DA  - 2015/04
TI  - A Method of Malicous Application Detection
BT  - Proceedings of the 2015 International Conference on Education, Management, Information and Medicine
PB  - Atlantis Press
SP  - 579
EP  - 585
SN  - 2352-5428
UR  - https://doi.org/10.2991/emim-15.2015.115
DO  - https://doi.org/10.2991/emim-15.2015.115
ID  - Cheng2015/04
ER  -