Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6884845 | Journal of Network and Computer Applications | 2018 | 46 Pages |
Abstract
Our detection strategy is grounded in concise definitions of collusion and the concept of ASR (Access-Send-Receive) signatures. The methodology is supported by statistical evidence. Our approach scales and is applicable to inclusion into professional malware detection systems: we applied it to a set of more than 50,000 apps collected in the wild. Code samples of our tool as well as of the detected malware are available.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Jorge Blasco, Thomas M. Chen, Igor Muttik, Markus Roggenbach,