A Method of Malicous Application Detection
- https://doi.org/10.2991/emim-15.2015.115How to use a DOI?
- Malware detection; Data analysis optimization; Path optimization; Symbolic computation; Stream tracing
With the rapid development of broadband wireless access technology and mobile terminal, the mobile internet developed quickly in recent years. However, malicious applications have become one of the key factors threatening the development of mobile internet. In order to protect vital interest of mobile terminal users, mobile malicious applications should be effectively prevented and controlled. This paper analyzes the existence limitation of current mobile application detection technology and uses symbolic execution on the base of stream tracing. Malicious code writers usually hide malicious code execution path, and in some special circumstances to trigger some malicious behaviors. We constraint solve execution routes with sensitive calls, and ultimately solve the specific backstage behaviors and trigger conditions. We did some experiments to evaluate the performance of the proposed method. The experimental results show that our method can work well.
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Xiao Cheng AU - Yanhui Guo AU - Qi Li PY - 2015/04 DA - 2015/04 TI - A Method of Malicous Application Detection BT - Proceedings of the 2015 International Conference on Education, Management, Information and Medicine PB - Atlantis Press SP - 579 EP - 585 SN - 2352-5428 UR - https://doi.org/10.2991/emim-15.2015.115 DO - https://doi.org/10.2991/emim-15.2015.115 ID - Cheng2015/04 ER -