Logo del repository
  1. Home
 
Opzioni

Visualizing the outcome of dynamic analysis of Android malware with VizMal

De Lorenzo, Andrea
•
Martinelli, Fabio
•
Medvet, Eric
altro
Santone, Antonella
2020
  • journal article

Periodico
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
Abstract
Malware detection techniques based on signature extraction require security analysts to manually inspect samples to find evidences of malicious behavior. This time-consuming task received little attention by researchers and practitioners, as most of the effort is on the identification as malware or non-malware of an entire sample. There are no tools for supporting the analyst in identifying when the malicious behavior occurs, given a sample. In this paper we propose VizMal, a tool able to visualize the execution traces of Android applications and to highlight which portions of the traces correspond to a potentially malicious behavior. The aim of VizMal is twofold: assisting the malware analyst during the inspection of an application and pushing the research community to organize and focus its effort on the malicious behavior localization. VizMal is able to discern if the application behavior during each second of execution are legitimate or malicious and to show this information in a simple and understandable way. We validate VizMal experimentally and by means of a user study: the results are promising and confirm that the tool can be useful.
DOI
10.1016/j.jisa.2019.102423
WOS
WOS:000505033600012
Archivio
http://hdl.handle.net/11368/2953327
info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85075537411
https://www.sciencedirect.com/science/article/pii/S2214212619303837
Diritti
open access
license:creative commons
license:copyright editore
license uri:http://creativecommons.org/licenses/by-nc-nd/4.0/
FVG url
https://arts.units.it/request-item?handle=11368/2953327
Soggetti
  • Malware analysi

  • Android

  • Machine learning

  • Multiple instance lea...

  • LSTM-RNN

  • Security

Scopus© citazioni
20
Data di acquisizione
Jun 14, 2022
Vedi dettagli
Web of Science© citazioni
29
Data di acquisizione
Feb 25, 2024
google-scholar
Get Involved!
  • Source Code
  • Documentation
  • Slack Channel
Make it your own

DSpace-CRIS can be extensively configured to meet your needs. Decide which information need to be collected and available with fine-grained security. Start updating the theme to match your nstitution's web identity.

Need professional help?

The original creators of DSpace-CRIS at 4Science can take your project to the next level, get in touch!

Realizzato con Software DSpace-CRIS - Estensione mantenuta e ottimizzata da 4Science

  • Impostazioni dei cookie
  • Informativa sulla privacy
  • Accordo con l'utente finale
  • Invia il tuo Feedback