http://scholars.ntou.edu.tw/handle/123456789/5984
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Huang, C. Y. | en_US |
dc.contributor.author | Shang-Pin Ma | en_US |
dc.contributor.author | Chang, M. L. | en_US |
dc.contributor.author | Chiu, C. H. | en_US |
dc.contributor.author | Huang, T. C. | en_US |
dc.date.accessioned | 2020-11-19T11:43:12Z | - |
dc.date.available | 2020-11-19T11:43:12Z | - |
dc.date.issued | 2014-03-01 | - |
dc.identifier.issn | 1607-9264 | - |
dc.identifier.uri | http://scholars.ntou.edu.tw/handle/123456789/5984 | - |
dc.description.abstract | For security and privacy considerations, it is important for Android users to understand the behavior and the risk of an application. Although Google claims that new applications available on the official market have passed their security checks, the open design of the Android system still allows a user to install applications for third party vendors. Therefore, there is still a demand for users to know more about an unknown application. In this paper, we discussed our experiences on setting up a scalable automated Android behavior monitor using virtualization techniques. Our contribution is two-fold: (1) We design and implement a scalable behavior monitor using both dynamic analysis and static analysis techniques; and (2) Based on parts of the analyzed results, we develop a preliminary filter to distinguish benign and malicious applications. The system is open to the public and we expect that the analyzed results can be fed back to the research community and further stimulate more studies on analyzing malicious Android applications. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | Journal of Internet Technology | en_US |
dc.subject | Android | en_US |
dc.subject | Behavior monitor | en_US |
dc.subject | Classification | en_US |
dc.subject | Dynamic analysis | en_US |
dc.subject | Static analysis | en_US |
dc.title | An Open and Automated Android Behavior Monitor in Cloud | en_US |
dc.type | journal article | en_US |
dc.identifier.doi | <Go to ISI>://WOS:000334146400016 | - |
dc.identifier.doi | <Go to ISI>://WOS:000334146400016 | - |
dc.identifier.doi | 10.6138/jit.2014.15.2.15 | - |
dc.identifier.doi | <Go to ISI>://WOS:000334146400016 | - |
dc.identifier.doi | <Go to ISI>://WOS:000334146400016 | - |
dc.identifier.url | <Go to ISI>://WOS:000334146400016 | |
dc.relation.journalvolume | 15 | en_US |
dc.relation.journalissue | 2 | en_US |
dc.relation.pages | 297-305 | en_US |
item.cerifentitytype | Publications | - |
item.openairetype | journal article | - |
item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
item.fulltext | no fulltext | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
crisitem.author.dept | College of Electrical Engineering and Computer Science | - |
crisitem.author.dept | Department of Computer Science and Engineering | - |
crisitem.author.dept | National Taiwan Ocean University,NTOU | - |
crisitem.author.orcid | 0000-0002-3317-5750 | - |
crisitem.author.parentorg | National Taiwan Ocean University,NTOU | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
Appears in Collections: | 資訊工程學系 |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.