In this paper, we propose a new dynamic and configurable approach to anti-emulation malware analysis, aiming at improving transparency of existing analyses techniques. First of all, we test the effectiveness of existing widespread free analyzers. We observe that the main problem of these analyses is that they provide static and immutable values to the parameter used in anti-emulation tests. Our approach aims at overcoming these limitations by providing an abstract non-interference-based approach modeling the fact that parameters can be modified dynamically, and the corresponding executions compared
Malware signature extraction is currently a manual and a time-consuming process. As a matter of fact...
Similar to the PC world, the abundance of mobile malware has become a serious threat to smartphone u...
Abstract—Smart mobile devices have been widely used and the contained sensitive information is endan...
In this paper, we propose a new dynamic and configurableapproach to anti-emulation malware analysis,...
Antivirus companies, mobile application marketplaces, and the se-curity research community, employ t...
Antivirus companies, mobile application marketplaces, and the se-curity research community, employ t...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
In the past few years, Android security is enhanced and state-of-the-art anti-malware tools have be...
In resource constrained devices, malware detection is typically based on offline analysis using emul...
International audienceAn important part of malware analysis is dynamic analysis. Dynamic analysis tr...
The large amounts of malware, and its diversity, have made it nec-essary for the security community ...
Dynamic analysis is an important technique used in malware analysis and is complementary to static a...
The recent past has shown that Android smartphones became the most popular target for malware author...
With Smartphones becoming an increasingly important part of human life, the security of these device...
Malware signature extraction is currently a manual and a time-consuming process. As a matter of fact...
Similar to the PC world, the abundance of mobile malware has become a serious threat to smartphone u...
Abstract—Smart mobile devices have been widely used and the contained sensitive information is endan...
In this paper, we propose a new dynamic and configurableapproach to anti-emulation malware analysis,...
Antivirus companies, mobile application marketplaces, and the se-curity research community, employ t...
Antivirus companies, mobile application marketplaces, and the se-curity research community, employ t...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
In the past few years, Android security is enhanced and state-of-the-art anti-malware tools have be...
In resource constrained devices, malware detection is typically based on offline analysis using emul...
International audienceAn important part of malware analysis is dynamic analysis. Dynamic analysis tr...
The large amounts of malware, and its diversity, have made it nec-essary for the security community ...
Dynamic analysis is an important technique used in malware analysis and is complementary to static a...
The recent past has shown that Android smartphones became the most popular target for malware author...
With Smartphones becoming an increasingly important part of human life, the security of these device...
Malware signature extraction is currently a manual and a time-consuming process. As a matter of fact...
Similar to the PC world, the abundance of mobile malware has become a serious threat to smartphone u...
Abstract—Smart mobile devices have been widely used and the contained sensitive information is endan...