scholarly journals Detecting Android Malwares with High-Efficient Hybrid Analyzing Methods

2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Yu Liu ◽  
Kai Guo ◽  
Xiangdong Huang ◽  
Zhou Zhou ◽  
Yichi Zhang

In order to tackle the security issues caused by malwares of Android OS, we proposed a high-efficient hybrid-detecting scheme for Android malwares. Our scheme employed different analyzing methods (static and dynamic methods) to construct a flexible detecting scheme. In this paper, we proposed some detecting techniques such as Com+ feature based on traditional Permission and API call features to improve the performance of static detection. The collapsing issue of traditional function call graph-based malware detection was also avoided, as we adopted feature selection and clustering method to unify function call graph features of various dimensions into same dimension. In order to verify the performance of our scheme, we built an open-access malware dataset in our experiments. The experimental results showed that the suggested scheme achieved high malware-detecting accuracy, and the scheme could be used to establish Android malware-detecting cloud services, which can automatically adopt high-efficiency analyzing methods according to the properties of the Android applications.

Electronics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 186
Author(s):  
Yang Yang ◽  
Xuehui Du ◽  
Zhi Yang ◽  
Xing Liu

The openness of Android operating system not only brings convenience to users, but also leads to the attack threat from a large number of malicious applications (apps). Thus malware detection has become the research focus in the field of mobile security. In order to solve the problem of more coarse-grained feature selection and larger feature loss of graph structure existing in the current detection methods, we put forward a method named DGCNDroid for Android malware detection, which is based on the deep graph convolutional network. Our method starts by generating a function call graph for the decompiled Android application. Then the function call subgraph containing the sensitive application programming interface (API) is extracted. Finally, the function call subgraphs with structural features are trained as the input of the deep graph convolutional network. Thus the detection and classification of malicious apps can be realized. Through experimentation on a dataset containing 11,120 Android apps, the method proposed in this paper can achieve detection accuracy of 98.2%, which is higher than other existing detection methods.


Sensors ◽  
2020 ◽  
Vol 20 (13) ◽  
pp. 3645
Author(s):  
Weina Niu ◽  
Rong Cao ◽  
Xiaosong Zhang ◽  
Kangyi Ding ◽  
Kaimeng Zhang ◽  
...  

Due to the openness of an Android system, many Internet of Things (IoT) devices are running the Android system and Android devices have become a common control terminal for IoT devices because of various sensors on them. With the popularity of IoT devices, malware on Android-based IoT devices is also increasing. People’s lives and privacy security are threatened. To reduce such threat, many researchers have proposed new methods to detect Android malware. Currently, most malware detection products on the market are based on malware signatures, which have a fast detection speed and normally a low false alarm rate for known malware families. However, they cannot detect unknown malware and are easily evaded by malware that is confused or packaged. Many new solutions use syntactic features and machine learning techniques to classify Android malware. It has been known that analysis of the Function Call Graph (FCG) can capture behavioral features of malware well. This paper presents a new approach to classifying Android malware based on deep learning and OpCode-level FCG. The FCG is obtained through static analysis of Operation Code (OpCode), and the deep learning model we used is the Long Short-Term Memory (LSTM). We conducted experiments on a dataset with 1796 Android malware samples classified into two categories (obtained from Virusshare and AndroZoo) and 1000 benign Android apps. Our experimental results showed that our proposed approach with an accuracy of 97 % outperforms the state-of-the-art methods such as those proposed by Nikola et al. and Hou et al. (IJCAI-18) with the accuracy of 97 % and 91 % , respectively. The time consumption of our proposed approach is less than the other two methods.


Author(s):  
Chen-Jing Sun ◽  
Li-Ping Zhao ◽  
Rui Wang

: With the development of industrialization, the global environmental pollution and energy crisis are becoming increasingly serious. Organic pollutants pose a serious health threat to human beings and other organisms. The removal of organic pollutants in environment has become a global challenge. The photocatalytic technology has been widely used in the degradation of organic pollutants with its characteristics of simple process, high efficiency, thorough degradation and no secondary pollution. However, the single photocatalyst represented by TiO2 has disadvantages of low light utilization rate and high recombination rate of photocarriers. Building heterojunction is considered one of the most effective methods to enhance the photocatalytic performance of single photocatalyst, which can improve the separation efficiency of photocarriers and utilization of visible light. The classical heterojunction can be divided into four different cases: type I, typeⅡ, p–n heterojunctions and Z-scheme junction. In this paper, the recent progress in the treatment of organic pollution by heterostructure photocatalysts is summarized and the mechanism of heterostructure photocatalysts for the treatment of organic pollutants is reviewed. It is expected that this paper can deepen the understanding of heterostructure photocatalysts and provide guidance for high efficient photocatalytic degradation of organic pollutants in the future.


2021 ◽  
Vol 11 (3) ◽  
pp. 923
Author(s):  
Guohua Li ◽  
Joon Woo ◽  
Sang Boem Lim

The complexity of high-performance computing (HPC) workflows is an important issue in the provision of HPC cloud services in most national supercomputing centers. This complexity problem is especially critical because it affects HPC resource scalability, management efficiency, and convenience of use. To solve this problem, while exploiting the advantage of bare-metal-level high performance, container-based cloud solutions have been developed. However, various problems still exist, such as an isolated environment between HPC and the cloud, security issues, and workload management issues. We propose an architecture that reduces this complexity by using Docker and Singularity, which are the container platforms most often used in the HPC cloud field. This HPC cloud architecture integrates both image management and job management, which are the two main elements of HPC cloud workflows. To evaluate the serviceability and performance of the proposed architecture, we developed and implemented a platform in an HPC cluster experiment. Experimental results indicated that the proposed HPC cloud architecture can reduce complexity to provide supercomputing resource scalability, high performance, user convenience, various HPC applications, and management efficiency.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


Author(s):  
Aya Mabrouki ◽  
Mohamed Latrach

This chapter proposes an overview of microwave energy harvesting with focuses on the design of high efficiency low power rectifying circuits. A background survey of RF energy harvesting techniques is presented first. Then, the performances of conventional rectifier topologies are analyzed and discussed. A review of the most efficient rectenna designs, from the state of the art, is also presented. Design considerations for low power rectifier operations are detailed and new high efficient rectifying circuits are designed and evaluated in both GSM and ISM bands under low power constraints.


2019 ◽  
Vol 3 (122) ◽  
pp. 59-71
Author(s):  
Volodymyr Serhiiovych Hryshyn ◽  
Serhii Oleksiiovych Abramov

Technological possibilities of jet processing cause increased attention to the study of the regularities of the process. The main interest for practice is the establishment of the kind of dependencies between technological parameters (abrasive particles size, particle speed, concentration, compressed air pressure, attack angle, physical and mechanical properties of particles and surface to be treated) and initial process parameters (roughness of the treated surface, removal rates of the metal and libel). That, in turn, determines the necessity of optimal choice of the values of technological parameters in the conditions of a concrete production situation. The basic regularities can be established as a result of regression analysis of experimental data. However, the use of the resulting laws is limited to the complexity of the process and relatively narrow areas of changing the parameters of the experiment.The purpose of the work is to determine the factors that determine the formation of a microrelief in the area of the abrasive air jet, the relationship between them and the degree of their effect on the intensity of the formation of a microrelief; formation of a model of finishing treatment of collector plates, creation of theoretical bases and methodology of designing high-efficient resource-saving technological processes of production of motor collectors of electric machines.Analysis of recent research and publications. The following contributions were made to the development of the theory of modeling of the inkjet-abrasive surface treatment: Volovetsky O.E., Denysyuk V.Yu., Kharchik M.M., Buts BP, Andilahi A.A., Novikov FV, Gordeyev AI, Urbanyuk Ye.A., Silin R.S. and other.The most universal approach based on determining the search dependencies and solving the problem of optimizing the technological parameters of the processing process as a result of statistical simulation, namely the ability to control the input parameters before the start of the model or in the process of work - one of the key benefits of using simulation modeling for the analysis of systems and processes. This allows you to determine the optimal parameters, which maximize the efficiency of the processes, determine the relationship between the input and output parameters.The paper considers: creation of theoretical bases and methodology of designing high-efficiency resource-saving technological processes of production of motor collectors of electric machines; the process of formation of microrelief of collector plates in the area of the abrasive air jet, the relationship between the factors and the degree of their influence on the intensity of formation. The formation of a model of finishing treatment of collector plates treated with silicon carbide (black) was determined.Prospects for further research are the improvement of the technological process of obtaining collector nodes on the possibilities of implementation.


Sign in / Sign up

Export Citation Format

Share Document