Dissertations / Theses on the topic 'Mobile malware detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 19 dissertations / theses for your research on the topic 'Mobile malware detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Khoda, Mahbub. "Robust Mobile Malware Detection." Thesis, Federation University Australi, 2020. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/176412.
Full textDoctor of Philosophy
Kinable, Joris. "Malware Detection Through Call Graphs." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10908.
Full textAl, Sebea Hussain. "Dynamic detection and immunisation of malware using mobile agents." Thesis, Edinburgh Napier University, 2005. http://researchrepository.napier.ac.uk/output/4036/.
Full textBurguera, Hidalgo Iker. "Behavior-based malware detection system for the Android platform." Thesis, Linköpings universitet, RTSLAB - Laboratoriet för realtidssystem, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73647.
Full textGitzinger, Louison. "Surviving the massive proliferation of mobile malware." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S058.
Full textNowadays, many of us are surrounded by smart devices that seamlessly operate interactively and autonomously together with multiple services to make our lives more comfortable. These smart devices are part of larger ecosystems, in which various companies collaborate to ease the distribution of applications between developers and users. However malicious attackers take advantage of them illegitimately to infect users' smart devices with malicious applications. Despite all the efforts made to defend these ecosystems, the rate of devices infected with malware is still increasing in 2020. In this thesis, we explore three research axes with the aim of globally improving malware detection in the Android ecosystem. We demonstrate that the accuracy of machine learning-based detection systems can be improved by automating their evaluation and by reusing the concept of AutoML to fine-tune learning algorithms parameters. We propose an approach to automatically create malware variants from combinations of complex evasion techniques to diversify experimental malware datasets in order to challenge existing detection systems. Finally, we propose methods to globally increase the quality of experimental datasets used to train and test detection systems
Adeel, Muhammad. "Adaptive mobile P2P malware detection using social interactions based digital footprints." Thesis, Queen Mary, University of London, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612575.
Full textVural, Ickin. "Spamming mobile botnet detection using computational intelligence." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/36775.
Full textDissertation (MSc)--University of Pretoria, 2013.
gm2014
Computer Science
unrestricted
Arp, Daniel Christopher Verfasser], Konrad [Akademischer Betreuer] [Rieck, and Lorenzo [Akademischer Betreuer] Cavallaro. "Efficient and Explainable Detection of Mobile Malware with Machine Learning / Daniel Christopher Arp ; Konrad Rieck, Lorenzo Cavallaro." Braunschweig : Technische Universität Braunschweig, 2019. http://d-nb.info/1195705018/34.
Full textArp, Daniel Christopher [Verfasser], Konrad [Akademischer Betreuer] Rieck, and Lorenzo [Akademischer Betreuer] Cavallaro. "Efficient and Explainable Detection of Mobile Malware with Machine Learning / Daniel Christopher Arp ; Konrad Rieck, Lorenzo Cavallaro." Braunschweig : Technische Universität Braunschweig, 2019. http://d-nb.info/1195705018/34.
Full textIrolla, Paul. "Formalization of Neural Network Applications to Secure 3D Mobile Applications." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS585/document.
Full textThis thesis work is part of the 3D NeuroSecure project. It is an investment project, that aims to develop a secure collaborative solution for therapeutic innovation using high performance processing(HPC) technology to the biomedical world. This solution will give the opportunity for experts from different fields to navigate intuitivelyin the Big Data imaging with access via 3D light terminals. Biomedicaldata protection against data leaks is of foremost importance. As such,the client environnement and communications with the server must besecured. We focused our work on the development of antimalware solutionon the Android OS. We emphasizes the creation of new algorithms,methods and tools that carry advantages over the current state-of-the-art, but more importantly that can be used effectively ina production context. It is why, what is proposed here is often acompromise between what theoretically can be done and its applicability. Algorithmic and technological choices are motivated by arelation of efficiency and performance results. This thesis contributes to the state of the art in the following areas:Static and dynamic analysis of Android applications, application web crawling.First, to search for malicious activities and vulnerabilities, oneneeds to design the tools that extract pertinent information from Android applications. It is the basis of any analysis. Furthermore,any classifier or detector is always limited by the informative power of underlying data. An important part of this thesis is the designing of efficient static and dynamic analysis tools forapplications, such as an reverse engineering module, a networkcommunication analysis tool, an instrumented Android system, an application web crawlers etc.Neural Network initialization, training and anti-saturation techniques algorithm.Neural Networks are randomly initialized. It is possible to control the underlying random distribution in order to the reduce the saturation effect, the training time and the capacity to reach theglobal minimum. We developed an initialization procedure that enhances the results compared to the state-of-the-art. We also revisited ADAM algorithm to take into account interdependencies with regularization techniques, in particular Dropout. Last, we use anti-saturation techniques and we show that they are required tocorrectly train a neural network.An algorithm for collecting the common sequences in a sequence group.We propose a new algorithm for building the Embedding Antichain fromthe set of common subsequences. It is able to process and represent allcommon subsequences of a sequence set. It is a tool for solving the Systematic Characterization of Sequence Groups. This algorithm is a newpath of research toward the automatic creation of malware familydetection rules
Kühnel, Marián [Verfasser], Ulrike [Akademischer Betreuer] Meyer, and Felix C. [Akademischer Betreuer] Freiling. "Detection of Traffic Initiated by Mobile Malware Targeting Android Devices in 3GPP Networks / Marián Kühnel ; Ulrike Meyer, Felix C. Freiling." Aachen : Universitätsbibliothek der RWTH Aachen, 2017. http://d-nb.info/1162499265/34.
Full textLopes, João Pedro Lapa da Silva. "Malware detection methods for Android mobile applications." Master's thesis, 2020. http://hdl.handle.net/10071/22189.
Full textOs avanços na computação móvel estão a atrair utilizadores de dispositivos tradicionais a transitar para as plataformas móveis para atender às suas necessidades de processamento de dados. Entre estas, a plataforma Android é a mais popular, detendo a maioria da quota de mercado devido à sua política open-source e capacidade de instalar aplicações através de várias lojas de aplicações. Este facto, conjuntamente com a quantidade de dados sensíveis que estes dispositivos agora armazenam, torna o ataque à plataforma Android atraente para os autores de malware, causando um grande fluxo de aplicações maliciosas no ecossistema. Os métodos tradicionais de deteção de malware não conseguem controlar e prevenir este fluxo eficazmente, exigindo uma abordagem automática e inteligente, como a aprendizagem automática. Nesta tese, três algoritmos de aprendizagem automática, XGBoost, SVM e K-NN, foram treinados com diversas características, focando-se nas permissões Android e características estáticas das aplicações, para medir a eficácia da aplicação de técnicas de aprendizagem automática no combate à proliferação de malware. Dado o rácio de goodware para malware de 99/1 do conjunto de dados, realizaram-se quatro experiências com uma versão subamostrada do mesmo com um rácio de 70/30 para testar diferentes subconjuntos do espaço de características bem como eliminação e agregação de características antes de treinar os algoritmos com o conjunto completo de características usando normalização de características em dois cenários. Esta abordagem apresentou resultados promissores, com XGBoost, SVM e K-NN distinguindo entre malware e goodware com um score de 90 % (valores Area Under the Receiver Operating Curve).
Tsai, Yu-Hsuan, and 蔡育軒. "Fast Mobile Malware Detection Based on Hybrid Analysis Method." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/wd4we4.
Full text國立中山大學
資訊管理學系研究所
104
More and more people nowadays use mobile devices. Mobile malwares are also increase very quickly. How to protect mobile devices become an important issue. The two main kinds of approaches to detect mobile malwares are static approaches and dynamic approaches. Dynamic approaches detect malware base on the actual behaviors of applications but how to trigger malicious behavior and the efficient of dynamic approaches are the difficulties of this kind of approaches. Most of the static approaches cannot know what malicious behaviors malwares will conduct. Android is the most popular mobile platform and the main target of malwares. Because Android applications are developed using Java programing language, it’s easier to get application source codes using reverse engineering techniques. The proposed system using data flow analysis on source codes reverse from applications to extract feature. Then using genetic algorithm to obtain features which are helpful to distinguish malicious behaviors. We conduct an experiment on 1,259 malwares and 1,259 benign applications downloaded from Google Play. We can detect 96.5% of the malwares and have precision with 90%.
Yang, Min-Jhe, and 楊旻哲. "A Dom-based malware detection mechanism for mobile device." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/51468576116088403961.
Full text國立雲林科技大學
資訊管理系碩士班
99
Mobile device are getting increasingly popular, it has become a trend in communication industry, and thus several malwares appeared targeting smartphone. At present, the countermeasures to malware on smartphone are limited to signature-based solutions which efficiently detect known malware, but they have serious drawback that cannot detect malware variants and usually need a large database. In order to solve above problems, we propose a malware detection mechanism which uses Document object model to analyze application‟s behavior on mobile device to improve the problem of traditional detection system. In the experimental stage, we used 100 benign and 47 malwares for evaluation and apply nine data mining algorithms to training classifier, using our proposed feature extract approach. The experimental result shows that our proposed detection mechanism not only detects malware proactive and high accuracy but also the performance of classifiers that using our extracted feature is better than permission-based.
TAN, GENG-LUN, and 譚庚倫. "Mobile Malware Network Packet Detection System based on SVM." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/22019794505066543690.
Full text銘傳大學
資訊傳播工程學系碩士班
105
Smart phones have become very popular recently. People get used to storing personal profiles such as contact information, email account and password, into their mobile devices. Almost all mobile phones used either Android or IOS operation system. People relying on mobile because of the convenience and functions. However there are some problems while using the mobile including mobile security. Android system is an open source, hence it allows the apps which are not authenticated by official company to be installed into user’s mobile phone. Because of the above reasons, the hackers’ attacking target starts to switch from PC to mobile phones. The hackers steal the user’s private information form user’s mobile devices with malware apps, or send the malware code to user’s phones to execute attack job. This research proposes an agent-based malware network packet detection system. The system employs agent app to periodically collect user’s network packets and store the packets into the pcap file. It then transfers the pcap file which stores the GET protocol packets to a remote server and stores GET protocol packet’s content into the database. The GET packet content in database is analyzed with Support Vector Machine (SVM) to predict the malware behavior. LibSVM and Scikit-learn are used to model the collected GET protocol packet’s contents, and their performances are compared in the thesis. This proposed system also provides interfaces including Agent App and website, which shows the results of the analysis, the history management and model management for the query of users.
Lima, António Carlos Lagarto Cabral Bastos de. "Analysis and detection of anomalies in mobile devices." Master's thesis, 2017. http://hdl.handle.net/10316/83277.
Full textAs organizações são frequentemente encaradas com a necessidade de gerir um elevado número de dispositivos móveis, incluindo um controlo apertado de aspetos como perfis de utilização, customização, aplicações e segurança. Inclusivamente, o crescimento do paradigma "Bring Your Own Device" (BYOD) tem contribuído para o aglomerar destes requisitos, tornando difícil a tarefa de equilibrar regulamentos empresariais e liberdade de utilização.Neste contexto, segurança é um dos principais requisitos para uso individual e empresarial. A proteção de dispositivos e de informação em ecossistemas móveis é bastante diferente quando comparada a outros dispositivos como computadores portáteis e fixos, devido a características e restrições específicas. Por exemplo, o custo do consumo de recursos por parte dos mecanismos de segurança, que é de menor relevância em ambientes de computadores fixos ou portáteis, é crítico para dispositivos móveis que frequentemente têm menos poder de processamento e necessitam de manter o seu consumo energético o menos elevado possível.Mecanismos de segurança para dispositivos móveis combinam ferramentas de prevenção (e.g. ambientes de execução confiáveis e aplicações em modo Sandbox), soluções de monitorização e técnicas de reação e mitigação. Nesta tese começamos com uma visão geral destas soluções de segurança, apresentando os resultados da nossa pesquisa sobre estas tecnologias, frameworks e cenários de utilização para gestão e monitorização de segurança para dispositivos móveis, com ênfase nos benefícios e nos desafios ainda em aberto, tanto do ponto de vista do utilizador final como do empresarial.Tendo analisado o estado da arte tecnológico, demonstramos a nossa tentativa de analisar e detetar anomalias em dispositivos móveis num cenário empresarial, os problemas e respetivas soluções de implementação contempladas, bem como os detalhes de desenvolvimento para os alcançar. O sistema descrito é composto por: uma aplicação Android, com o intuito de ser instalada nos dispositivos utilizados; Corretores de Mensagens com perfil leve; um Agregador Central, servindo como o cerne do sistema, processando e gerindo os dados recolhidos pelos dispositivos móveis; um Painel de Controlo para Monitorização, permitindo que o sistema seja alterado enquanto funciona por supervisores humanos.Por fim, avaliamos o projeto, exibindo os resultados preliminares obtidos ao longo do desenvolvimento do sistema, examinando as implicações que os resultados fomentam, avaliando o atual estado das tarefas e requisitos propostos para o projeto, e propondo um rumo para trabalho futuro.
Organizations are often faced with the need to manage large numbers of mobile device assets, including tight control over aspects such as usage profiles, customization, applications and security. Moreover, the rise of the Bring Your Own Device (BYOD) paradigm has further contributed to hamper these requirements, making it difficult to strike a balance between corporate regulations and freedom of usage.In this scope, security is one of the main requirements both for individual and corporate usage. Device and information protection on mobile ecosystems is quite different from securing other assets such as laptops or desktops, due to specific characteristics and restrictions. For instance, the resource consumption overhead of security mechanisms, which is less relevant for desktop/laptop environments, is critical for mobile devices which frequently have less computing power and must keep power consumption as low as possible.Security mechanisms for mobile devices combine preventive tools (e.g. Trusted Execution Environments and sandboxed applications), monitoring solutions and reactive and mitigation techniques. In this thesis we start by overviewing these security solutions, presenting a survey on the technologies, frameworks and use cases for mobile device security monitoring and management, with an emphasis on the associated open challenges and benefits, from both the end-user and the corporate points-of-view.Having analyzed the technological state of the art, we showcase our attempt at analyzing and detecting anomalies in mobile devices on an enterprise scenario, the contemplated and solved implementation ordeals, and the employed development details to achieve it. The described system is comprised of: an Android application, intended to be installed on the target devices; lightweight Message Brokers; a Central Aggregator, serving as the core of the system, processing and managing the collected data from the mobile assets; a Monitoring Dashboard, enabling the system to be altered at runtime by supervising humans.Lastly, we evaluate the project, exhibiting the preliminary results obtained through the developed system, examining the implications that the results warrant, assessing the current state of the project's proposed tasks and requirements, and proposing the course of action for future work.
Universidade de Coimbra - Bolsa de Investigação: (745€ * 6 meses) + (745€ * 3 meses) = 6.705€
Chia-Wei, Kao, and 高家緯. "An Effective Unknown Botnet Malware Detection Mechanism for Android-based Mobile Devices." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/11971069157005073291.
Full text大葉大學
資訊管理學系碩士班
99
At present, the smart phone system is developing vigorously, in which Android occupies most of the current market share, using the open operating system to provide overall effective applications (APPs) for the users to install. However, while it provides protection, it also brings harms just like a double-edged sword. Some malware may hide in the various Android APPs. This study mainly discusses one of the Android botnets, which abuses the powerful connection function of Android. Its distributed denial of service (DDoS)attacks have the features of the large-scaled botnet, plus the high mobility of the Android mobile device, so it will cause greater harm to the targets than the conventional DDoS attacks, and it is hard to track the attack source. This malware makes the Android connection slower, so that users cannot normally use the network service. What worse, the greater threat is that it blocks the operation of servers; as a result, the uninfected Android smart phones can’t normally access the network services. Nowadays, most of the conventional DDoS detection mechanisms are in the server-end, which can only temporarily relieve the DDoS attacks to stabilize the normal service, but don’t provide effective solution to the Android botnet problems. Furthermore, the conventional detectors are not designed for mobile devices, so its design mechanism is not suitable for the mobile devices with low performance, limited powers and less storage space. Therefore, in order to design an effective detection mechanism to unknown botnet malware, this study first develops a kind of Android botnet malware based on the HTTP Flood attack, which is the most inundant DDoS attack and is hard to detect; meanwhile, it cannot be detected by the well-known anti-virus software tools. Afterward, we further develop a mechanism that cannot only effectively detect a wide variety of unknown botnet malware, but also detect the botnet malware developed in this study. The performance evaluation and analysis reveal the proposed detection mechanism indeed has high detection accuracy, and is superior to the related studies in terms of performance requirements and practical applications. Thus, we affirm the proposed detection mechanism has extremely high practical application value.
LIN, WEI-TING, and 林維庭. "Mobile Malware Detection in Sandbox with Live Event Feeding and Log Pattern Analysis." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/46688900875375095628.
Full text國立中正大學
通訊工程研究所
104
In recent years, the use of smart devices is becoming increasingly popular. All kinds of mobile applications are emerging. In addition to the official market, there are also many ways to allow users to download the mobile app. As unidentified instances of malware grow day by day, off-the-shelf malware detection methods identify malicious programs mainly with extracted signatures of codes, which only can effectively identify already known malwares, but not new malwares in initial spread. If no samples of these malwares are reported and the virus code library is not patched, users won’t be alerted to the malwares. Meanwhile, scanning each running programs on the mobile device is a very resource-consuming and power-consuming job. A detection method that can save resources and power as well as effectively identify unknown malware in time is essential. Therefore, this paper proposes a new detection method by live log analysis. A sandbox is conducted to mimic human operations and monitor responses from APPs. Feeding these manual events can excite deactivated malwares and improve the accuracy of log analysis, even though these malware are unknown yet. This study takes recent malwares and benign programs to conduct experiments, and then verifies the effectiveness of the proposed method comparing with those in other papers. The experimental results show that the proposed method outperforms in both hit rate and pass rate.
Costa, Sara Silva. "Security threats management in android systems." Master's thesis, 2017. http://hdl.handle.net/1822/55037.
Full textWith the exponential use of mobile phones to handle sensitive information, the intrusion systems development has also increased. Malicious software is constantly being developed and the intrusion techniques are increasingly more sophisticated. Security protection systems trying to counteract these intrusions are constantly being improved and updated. Being Android one of the most popular operating systems, it became an intrusion’s methods development target. Developed security solutions constantly monitor their host system and by accessing a set of defined parameters they try to find potentially harmful changes. An important topic when addressing malicious applications detection is the malware identification and characterization. Usually, to separate the normal system behavior from the malicious behavior, security systems employ machine learning or data mining techniques. However, with the constant evolution of malicious applications, such techniques are still far from being capable of completely responding to the market needs. This dissertation aim was to verify if malicious behavior patterns definition is a viable way of addressing this challenge. As part of the proposed research two data mining classification models were built and tested with the collected data, and their performances were compared. the RapidMiner software was used for the proposed model development and testing, and data was collected from the FlowDroid application. To facilitate the understanding of the security potential of the Android framework, research was done on the its architecture, overall structure, and security methods, including its protection mechanisms and breaches. It was also done a study on models threats/attacks’ description, as well as, on the current existing applications for anti-mobile threats, analyzing their strengths and weaknesses.
Com o uso exponencial de telefones para lidar com informações sensíveis, o desenvolvimento de sistemas de intrusão também aumentou. Softwares maliciosos estão constantemente a ser desenvolvidos e as técnicas de intrusão são cada vez mais sofisticadas. Para neutralizar essas intrusões, os sistemas de proteção de segurança precisam constantemente de ser melhorados e atualizados. Sendo o Android um dos sistemas operativos (SO) mais populares, tornou-se também num alvo de desenvolvimento de métodos de intrusão. As soluções de segurança desenvolvidas monitoram constantemente o sistema em que se encontram e acedendo a um o conjunto definido de parâmetros procuram alterações potencialmente prejudiciais. Um tópico importante ao abordar aplicações mal-intencionadas é a identificação e caracterização do malware. Normalmente, para separar o comportamento normal do sistema do comportamento mal-intencionado, os sistemas de segurança empregam técnicas de machine learning ou de data mining. No entanto, com a constante evolução das aplicações maliciosas, tais técnicas ainda estão longe de serem capazes de responder completamente às necessidades do mercado. Esta dissertação teve como objetivo verificar se os padrões de comportamento malicioso são uma forma viável de enfrentar esse desafio. Para responder à pesquisa proposta foram construídos e testados dois modelos de classificação de dados, usando técnicas de data mining, e com os dados recolhidos compararam-se os seus desempenhos. Para o desenvolvimento e teste do modelo proposto foi utilizado o software RapidMiner, e os dados foram recolhidos através do uso da aplicação FlowDroid. Para facilitar a compreensão sobre as potencialidades de segurança da framework do Android, realizou-se uma pesquisa sobre a sua arquitetura, estrutura geral e métodos de segurança, incluindo seus mecanismos de defesa e algumas das suas limitações. Além disso, realizou-se um estudo sobre algumas das atuais aplicações existentes para a defesa contra aplicações maliciosas, analisando os seus pontos fortes e fracos.