메뉴 건너뛰기




Volumn , Issue , 2014, Pages 447-458

Evading android runtime analysis via sandbox detection

Author keywords

Android; Evasion; Malware; Sandbox; Security

Indexed keywords

ANDROID (OPERATING SYSTEM); COMPUTER CRIME; MALWARE; VIRTUAL REALITY;

EID: 84982804575     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2590296.2590325     Document Type: Conference Paper
Times cited : (216)

References (41)
  • 2
    • 84984888152 scopus 로고    scopus 로고
    • Andrubis. http://anubis.iseclab.org/.
    • Andrubis1
  • 3
    • 84984926024 scopus 로고    scopus 로고
    • CopperDroid. http://copperdroid.isg.rhul.ac. uk/copperdroid/.
    • CopperDroid1
  • 4
    • 84984908977 scopus 로고    scopus 로고
    • DroidBox. https://code.google.com/p/droidbox/.
    • DroidBox1
  • 5
    • 84984926026 scopus 로고    scopus 로고
    • Droidbox device identifier patch. https://code.google.com/p/droidbox/ source/browse/trunk/droidbox23/ framework-base.patch?r=82.
    • Droidbox Device Identifier Patch
  • 6
    • 84984926016 scopus 로고    scopus 로고
    • Foresafe. http://www.foresafe.com/scan.
    • Foresafe1
  • 10
    • 84984866650 scopus 로고    scopus 로고
    • SandDroid. http://sanddroid.xjtu.edu.cn/.
    • SandDroid1
  • 14
    • 33845524232 scopus 로고    scopus 로고
    • Network intrusion detection: Automated and manual methods prone to attack and evasion
    • D. J. Chaboya, R. A. Raines, R. O. Baldwin, and B. E. Mullins. Network intrusion detection: automated and manual methods prone to attack and evasion. Security & Privacy, IEEE, 4(6):36-43, 2006.
    • (2006) Security & Privacy, IEEE , vol.4 , Issue.6 , pp. 36-43
    • Chaboya, D.J.1    Raines, R.A.2    Baldwin, R.O.3    Mullins, B.E.4
  • 16
    • 14844312929 scopus 로고    scopus 로고
    • Operational experiences with high-volume network intrusion detection
    • ACM
    • H. Dreger, A. Feldmann, V. Paxson, and R. Sommer. Operational experiences with high-volume network intrusion detection. In Proc. CCS, pages 2-11. ACM, 2004.
    • (2004) Proc. CCS , pp. 2-11
    • Dreger, H.1    Feldmann, A.2    Paxson, V.3    Sommer, R.4
  • 20
    • 34547359214 scopus 로고    scopus 로고
    • Evading network anomaly detection systems: Formal reasoning and practical techniques
    • ACM
    • P. Fogla and W. Lee. Evading network anomaly detection systems: formal reasoning and practical techniques. In Proc. CCS, pages 59-68. ACM, 2006.
    • (2006) Proc. CCS , pp. 59-68
    • Fogla, P.1    Lee, W.2
  • 21
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • M. Handley, V. Paxson, and C. Kreibich. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proc. USENIX Security, 2001.
    • (2001) Proc. USENIX Security
    • Handley, M.1    Paxson, V.2    Kreibich, C.3
  • 23
    • 84868375110 scopus 로고    scopus 로고
    • A conundrum of permissions: Installing applications on an android smartphone
    • Springer
    • P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, and D. Wetherall. A conundrum of permissions: Installing applications on an android smartphone. In USEC'12, pages 68-79. Springer, 2012.
    • (2012) USEC'12 , pp. 68-79
    • Kelley, P.G.1    Consolvo, S.2    Cranor, L.F.3    Jung, J.4    Sadeh, N.5    Wetherall, D.6
  • 24
    • 77955172332 scopus 로고    scopus 로고
    • Measuring virtual machine detection in malware using dsd tracer
    • B. Lau and V. Svajcer. Measuring virtual machine detection in malware using dsd tracer. Journal in Computer Virology, 6(3):181-195, 2010.
    • (2010) Journal in Computer Virology , vol.6 , Issue.3 , pp. 181-195
    • Lau, B.1    Svajcer, V.2
  • 25
  • 29
    • 84984886495 scopus 로고    scopus 로고
    • Improvement of the pi calculation algorithm and implementation of fast multiple precision computation
    • T. Ooura. Improvement of the pi calculation algorithm and implementation of fast multiple precision computation. Transactions-Japan Society for Industrial and Applied Mathematics, 9(4):165-172, 1999.
    • (1999) Transactions-Japan Society for Industrial and Applied Mathematics , vol.9 , Issue.4 , pp. 165-172
    • Ooura, T.1
  • 30
    • 85084163236 scopus 로고    scopus 로고
    • A fistful of red-pills: How to automatically generate procedures to detect cpu emulators
    • USENIX
    • R. Paleari, L. Martignoni, G. F. Roglia, and D. Bruschi. A fistful of red-pills: How to automatically generate procedures to detect cpu emulators. In Proc. WOOT, volume 41, page 86. USENIX, 2009.
    • (2009) Proc. WOOT , vol.41 , pp. 86
    • Paleari, R.1    Martignoni, L.2    Roglia, G.F.3    Bruschi, D.4
  • 32
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, DTIC Document, 1998.
    • (1998) Technical Report, DTIC Document
    • Ptacek, T.H.1    Newsham, T.N.2
  • 34
    • 38149137346 scopus 로고    scopus 로고
    • Red pill... or how to detect vmm using (almost) one cpu instruction
    • J. Rutkowska. Red pill... or how to detect vmm using (almost) one cpu instruction. Invisible Things, 2004.
    • (2004) Invisible Things
    • Rutkowska, J.1
  • 36
    • 84874823267 scopus 로고    scopus 로고
    • Sweetening android lemon markets: Measuring and combating malware in application marketplaces
    • ACM
    • T. Vidas and N. Christin. Sweetening android lemon markets: measuring and combating malware in application marketplaces. In Proc. 3rd CODASPY, pages 197-208. ACM, 2013.
    • (2013) Proc. 3rd CODASPY , pp. 197-208
    • Vidas, T.1    Christin, N.2
  • 37
    • 85084161115 scopus 로고    scopus 로고
    • All your droid are belong to us: A survey of current android attacks
    • T. Vidas, D. Votipka, and N. Christin. All your droid are belong to us: A survey of current android attacks. In Proc. WOOT. USENIX, 2011.
    • (2011) Proc. WOOT. USENIX
    • Vidas, T.1    Votipka, D.2    Christin, N.3
  • 38
    • 84864618030 scopus 로고    scopus 로고
    • Toward a general collection methodology for android devices
    • T. Vidas, C. Zhang, and N. Christin. Toward a general collection methodology for android devices. DFRWS'11, 2011.
    • (2011) DFRWS'11
    • Vidas, T.1    Zhang, C.2    Christin, N.3
  • 39
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using cwsandbox
    • C. Willems, T. Holz, and F. Freiling. Toward automated dynamic malware analysis using cwsandbox. Security & Privacy, IEEE, 5(2):32-39, 2007.
    • (2007) Security & Privacy, IEEE , vol.5 , Issue.2 , pp. 32-39
    • Willems, C.1    Holz, T.2    Freiling, F.3
  • 41
    • 84869431150 scopus 로고    scopus 로고
    • Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
    • Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In Proc. NDSS, 2012.
    • (2012) Proc. NDSS
    • Zhou, Y.1    Wang, Z.2    Zhou, W.3    Jiang, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.