Behavior Analysis of Mobile Malware Based on Information Leakage

碩士 === 國立中山大學 === 資訊管理學系研究所 === 101 === With the advance of science and technology, mobile devices have been more powerful and no less from personal computer. There are more people using mobile device working, surfing the internet or other forms of entertainment. The user information on the mobile d...

Full description

Bibliographic Details
Main Authors: Wen-Ching Chiang, 江玟璟
Other Authors: Chia-Mei Chen
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/92590161671268091721
id ndltd-TW-101NSYS5396051
record_format oai_dc
spelling ndltd-TW-101NSYS53960512015-10-13T22:40:48Z http://ndltd.ncl.edu.tw/handle/92590161671268091721 Behavior Analysis of Mobile Malware Based on Information Leakage 基於資訊外洩的行動惡意軟體行為分析 Wen-Ching Chiang 江玟璟 碩士 國立中山大學 資訊管理學系研究所 101 With the advance of science and technology, mobile devices have been more powerful and no less from personal computer. There are more people using mobile device working, surfing the internet or other forms of entertainment. The user information on the mobile device draw cracker’s attention, and malware made by cracker targets on it. When using malware, many users would suffer losses.   By using behavior analysis and tracking mobile application on emulator can understand what behavior is there with sensitive information within execution period. We observe the behavior in three parts, file, network and SMS. We would check if file and network’s behavior delivers the sensitive data. Also, we check the unusual SMS. Experimental results show that the approach has higher true positive on detection rate and lower false positive rate as compared to those permission based methods. Chia-Mei Chen 陳嘉玫 2013 學位論文 ; thesis 46 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中山大學 === 資訊管理學系研究所 === 101 === With the advance of science and technology, mobile devices have been more powerful and no less from personal computer. There are more people using mobile device working, surfing the internet or other forms of entertainment. The user information on the mobile device draw cracker’s attention, and malware made by cracker targets on it. When using malware, many users would suffer losses.   By using behavior analysis and tracking mobile application on emulator can understand what behavior is there with sensitive information within execution period. We observe the behavior in three parts, file, network and SMS. We would check if file and network’s behavior delivers the sensitive data. Also, we check the unusual SMS. Experimental results show that the approach has higher true positive on detection rate and lower false positive rate as compared to those permission based methods.
author2 Chia-Mei Chen
author_facet Chia-Mei Chen
Wen-Ching Chiang
江玟璟
author Wen-Ching Chiang
江玟璟
spellingShingle Wen-Ching Chiang
江玟璟
Behavior Analysis of Mobile Malware Based on Information Leakage
author_sort Wen-Ching Chiang
title Behavior Analysis of Mobile Malware Based on Information Leakage
title_short Behavior Analysis of Mobile Malware Based on Information Leakage
title_full Behavior Analysis of Mobile Malware Based on Information Leakage
title_fullStr Behavior Analysis of Mobile Malware Based on Information Leakage
title_full_unstemmed Behavior Analysis of Mobile Malware Based on Information Leakage
title_sort behavior analysis of mobile malware based on information leakage
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/92590161671268091721
work_keys_str_mv AT wenchingchiang behavioranalysisofmobilemalwarebasedoninformationleakage
AT jiāngwénjǐng behavioranalysisofmobilemalwarebasedoninformationleakage
AT wenchingchiang jīyúzīxùnwàixièdexíngdòngèyìruǎntǐxíngwèifēnxī
AT jiāngwénjǐng jīyúzīxùnwàixièdexíngdòngèyìruǎntǐxíngwèifēnxī
_version_ 1718079667165986816