International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a previous work, we showed that they can also be used to characterize Android malware behaviours and in the current one we show that these flows can also be used to detect and identify Android malware. The characterization consists in computing automatically System Flow Graphs that describe how a malware disseminates its data in the system. In the current work, we propose a method that uses these SFG- based malware profile to detect the execution of Android malware by monitoring the information flows they cause in the system. We evaluated our method by monitoring the execution of 39 malware samples and 70 non malicious applications. Our result...
International audienceThis article uses a new data structure namely System Flow Graph (SFG) that off...
: Information flows are information exchanges between objects in a given environment. At system leve...
International audienceThis article uses a new data structure namely System Flow Graph (SFG) that off...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceThis article uses a new data structure namely System Flow Graph (SFG) that off...
International audienceThis article uses a new data structure namely System Flow Graph (SFG) that off...
: Information flows are information exchanges between objects in a given environment. At system leve...
: Information flows are information exchanges between objects in a given environment. At system leve...
: Information flows are information exchanges between objects in a given environment. At system leve...
International audienceThis article uses a new data structure namely System Flow Graph (SFG) that off...
: Information flows are information exchanges between objects in a given environment. At system leve...
International audienceThis article uses a new data structure namely System Flow Graph (SFG) that off...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
International audienceInformation flow monitoring has been mostly used to detect privacy leaks. In a...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceWe propose an approach based on information flows to highlight how a ma- licio...
International audienceThis article uses a new data structure namely System Flow Graph (SFG) that off...
International audienceThis article uses a new data structure namely System Flow Graph (SFG) that off...
: Information flows are information exchanges between objects in a given environment. At system leve...
: Information flows are information exchanges between objects in a given environment. At system leve...
: Information flows are information exchanges between objects in a given environment. At system leve...
International audienceThis article uses a new data structure namely System Flow Graph (SFG) that off...
: Information flows are information exchanges between objects in a given environment. At system leve...
International audienceThis article uses a new data structure namely System Flow Graph (SFG) that off...