Behavior Analysis of Mobile Malware Based on Information Leakage
碩士 === 國立中山大學 === 資訊管理學系研究所 === 101 === With the advance of science and technology, mobile devices have been more powerful and no less from personal computer. There are more people using mobile device working, surfing the internet or other forms of entertainment. The user information on the mobile d...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/92590161671268091721 |
id |
ndltd-TW-101NSYS5396051 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101NSYS53960512015-10-13T22:40:48Z http://ndltd.ncl.edu.tw/handle/92590161671268091721 Behavior Analysis of Mobile Malware Based on Information Leakage 基於資訊外洩的行動惡意軟體行為分析 Wen-Ching Chiang 江玟璟 碩士 國立中山大學 資訊管理學系研究所 101 With the advance of science and technology, mobile devices have been more powerful and no less from personal computer. There are more people using mobile device working, surfing the internet or other forms of entertainment. The user information on the mobile device draw cracker’s attention, and malware made by cracker targets on it. When using malware, many users would suffer losses. By using behavior analysis and tracking mobile application on emulator can understand what behavior is there with sensitive information within execution period. We observe the behavior in three parts, file, network and SMS. We would check if file and network’s behavior delivers the sensitive data. Also, we check the unusual SMS. Experimental results show that the approach has higher true positive on detection rate and lower false positive rate as compared to those permission based methods. Chia-Mei Chen 陳嘉玫 2013 學位論文 ; thesis 46 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中山大學 === 資訊管理學系研究所 === 101 === With the advance of science and technology, mobile devices have been more powerful and no less from personal computer. There are more people using mobile device working, surfing the internet or other forms of entertainment. The user information on the mobile device draw cracker’s attention, and malware made by cracker targets on it. When using malware, many users would suffer losses.
By using behavior analysis and tracking mobile application on emulator can understand what behavior is there with sensitive information within execution period. We observe the behavior in three parts, file, network and SMS. We would check if file and network’s behavior delivers the sensitive data. Also, we check the unusual SMS. Experimental results show that the approach has higher true positive on detection rate and lower false positive rate as compared to those permission based methods.
|
author2 |
Chia-Mei Chen |
author_facet |
Chia-Mei Chen Wen-Ching Chiang 江玟璟 |
author |
Wen-Ching Chiang 江玟璟 |
spellingShingle |
Wen-Ching Chiang 江玟璟 Behavior Analysis of Mobile Malware Based on Information Leakage |
author_sort |
Wen-Ching Chiang |
title |
Behavior Analysis of Mobile Malware Based on Information Leakage |
title_short |
Behavior Analysis of Mobile Malware Based on Information Leakage |
title_full |
Behavior Analysis of Mobile Malware Based on Information Leakage |
title_fullStr |
Behavior Analysis of Mobile Malware Based on Information Leakage |
title_full_unstemmed |
Behavior Analysis of Mobile Malware Based on Information Leakage |
title_sort |
behavior analysis of mobile malware based on information leakage |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/92590161671268091721 |
work_keys_str_mv |
AT wenchingchiang behavioranalysisofmobilemalwarebasedoninformationleakage AT jiāngwénjǐng behavioranalysisofmobilemalwarebasedoninformationleakage AT wenchingchiang jīyúzīxùnwàixièdexíngdòngèyìruǎntǐxíngwèifēnxī AT jiāngwénjǐng jīyúzīxùnwàixièdexíngdòngèyìruǎntǐxíngwèifēnxī |
_version_ |
1718079667165986816 |