HAL-Based Resource Manipulation Monitoring on AOSP
Nowadays, Android malware uses sensitive APIs to manipulate an Android device’s resources frequently. Conventional malware analysis uses hooking techniques to detect this harmful behavior. However, this approach is facing many problems, such as low coverage rate and computational overhead. To solve...
Main Authors: | Thien-Phuc Doan, Jungsoo Park, Souhwan Jung |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2020-01-01
|
Series: | Mobile Information Systems |
Online Access: | http://dx.doi.org/10.1155/2020/8863385 |
Similar Items
-
AppPACK: A Packaging Model for Single-Purpose Lightweight Virtualization Environment
by: Ngoc-Tu Chau, et al.
Published: (2021-01-01) -
Hål till Hål Massfördelning i Dieselinsprutare
by: Palmkvist, Anders
Published: (2007) -
Privacy enhancement using selective encryption scheme in data outsourcing
by: Long Nguyen-Vu, et al.
Published: (2016-07-01) -
Frans Hals
by: Frans Grijzenhout
Published: (2013-06-01) -
Mistisisme dan Hal-hal Tak Tercakapkan : Menimbang Epistemologi Hudhūrī
by: Muhammad Sabri
Published: (2012-06-01)