Malicious Application Determination Using the System Call Event |
Yun, SeokMin
(한신대학교 컴퓨터공학과)
Ham, YouJeong (한신대학교 컴퓨터공학과) Han, GeunShik (한신대학교 컴퓨터공학부) Lee, HyungWoo (한신대학교 컴퓨터공학부) |
1 | Wajeb, Abdulrahman Mirza, "Software Vulnerabilities, Banking Threats, Botnets and Malware Self-Protection Technologies," International Journal of Computer Science Issues(IJCSI), Vol.8, No.1, pp.236-241, 2011. |
2 | I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, "Crowdroid: Behavoir-Based Malware Detection System for Android," Proceeding of the 1st ACM workshop on security and privacy in smartphones and mobile devices (SPSM'11), ACM, Vol.1, pp.15-26, 2011. |
3 | Y. J. Ham, "Malicious Application Event Discrimination and Diagnosis Mechanism on SmartPhone," Master's Thesis, Hanshin University, 2014. |
4 | Suphakit Niwattanakul, Jatsada Singthongchai, Ekkachai Naenudorn, and Supachanun Wanapu, "Using of Jaccard Coefficient for Keywards Similarity," Proceedings of the International MultiConference of Engineering and Computer Scientists 2013 (IMECS 2013), Vol.1, pp.13-15, 2013. |
5 | Yajin Zhou, Xuxian Jiang, Android Malgenome Project, [Internet], http://www.malgenomeproject.org/ |
6 | Strace, trace system calls and signals, [Internet], http://linux.die.net/man/1/strace/ |
7 | Stehman, Stephen V, "Selecting and interpreting measures of thematic classification accuracy," Remote Sensing of Environment, Vol.62, No.1, pp.77-89, 1997. DOI |
8 | Fawcelt, Tom, "An Introduction to ROC Analysis," Pattern Recognition Letters, Vol.27, No.8, pp.861-874, 2006. DOI |
9 | Swets, John A, "Signal detection theory and ROC analysis in psychology and diagnostics," collected papers, Lawrence Erlbaum Associates, Mahwah, NJ, 1996. |
10 | C. H. Jun, "Data mining Techniques," Hannarae, 2012. |
11 | Breiman, L., Friedman, J., Stone, C. J., and Olshen, R. A., "Classification and regression trees," CRC press, 1984. |
12 | Christopher M. Bishop, "Pattern Recognition and Machine Learning," Springer, pp.205, 2006. |
13 | Y. J. Ham, H. W. Lee, "Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction," Journal of Internet Computing and Services(JICS), Vol.16, No.8, pp.125-139, 2013. |