Coverart for item
The Resource Android application security : a semantics and context-aware approach, Mu Zhang, Heng Yin

Android application security : a semantics and context-aware approach, Mu Zhang, Heng Yin

Label
Android application security : a semantics and context-aware approach
Title
Android application security
Title remainder
a semantics and context-aware approach
Statement of responsibility
Mu Zhang, Heng Yin
Creator
Contributor
Subject
Language
eng
Member of
Cataloging source
YDX
http://library.link/vocab/creatorName
Zhang, Mu
Dewey number
  • 005.8
  • 004
Index
no index present
LC call number
  • QA76.76.A65
  • QA75.5-76.95
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Yin, Heng
Series statement
SpringerBriefs in computer science,
http://library.link/vocab/subjectName
Application software
Label
Android application security : a semantics and context-aware approach, Mu Zhang, Heng Yin
Instantiates
Publication
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Preface; Intended Audience; Acknowledgments; Contents; 1 Introduction ; 1.1 Security Threats in Android Applications; 1.1.1 Malware Attacks; 1.1.2 Software Vulnerabilities; 1.1.3 Information Leakage; 1.1.4 Insecure Descriptions; 1.2 A Semantics and Context Aware Approach to Android Application Security; References; 2 Background; 2.1 Android Application; 2.1.1 Android Framework API; 2.1.2 Android Permission; 2.1.3 Android Component; 2.1.4 Android App Description; 2.2 Android Malware Detection; 2.2.1 Signature Detection and Malware Analysis; 2.2.2 Android Malware Classification
  • 2.3 Android Application Vulnerabilities2.3.1 Component Hijacking Vulnerabilities; 2.3.2 Automatic Patch and Signature Generation; 2.3.3 Bytecode Rewriting; 2.3.4 Instrumentation Code Optimization; 2.4 Privacy Leakage in Android Apps; 2.4.1 Privacy Leakage Detection; 2.4.2 Privacy Leak Mitigation; 2.4.3 Information Flow Control; 2.5 Text Analytics for Android Security; 2.5.1 Automated Generation of Software Description; References; 3 Semantics-Aware Android Malware Classification; 3.1 Introduction; 3.2 Overview; 3.2.1 Problem Statement; 3.2.2 Architecture Overview
  • 3.3 Weighted Contextual API Dependency Graph3.3.1 Key Behavioral Aspects; 3.3.2 Formal Definition; 3.3.3 A Real Example; 3.3.4 Graph Generation; 3.3.4.1 Entry Point Discovery; 3.3.4.2 Constant Analysis; 3.3.4.3 API Dependency Construction; 3.4 Android Malware Classification; 3.4.1 Graph Matching Score; 3.4.2 Weight Assignment; 3.4.2.1 Selection of Critical API Labels; 3.4.2.2 Weight Assignment; 3.4.3 Implementation and Graph Database Query; 3.4.4 Malware Classification; 3.4.4.1 Anomaly Detection; 3.4.4.2 Signature Detection; 3.5 Evaluation; 3.5.1 Dataset and Experiment Setup
  • 3.5.2 Summary of Graph Generation3.5.3 Classification Results; 3.5.3.1 Signature Detection; 3.5.3.2 Anomaly Detection; 3.5.3.3 Detection of Transformation Attacks; 3.5.4 Runtime Performance; 3.5.5 Effectiveness of Weight Generation and Weighted Graph Matching; References; 4 Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks ; 4.1 Introduction; 4.2 Problem Statement and Approach Overview; 4.2.1 Running Example; 4.2.2 Problem Statement; 4.2.3 Approach Overview; 4.3 Taint Slice Computation; 4.3.1 Running Example; 4.4 Patch Statement Placement
  • 4.5 Patch Optimization4.5.1 Optimized Patch for Running Example; 4.6 Experimental Evaluation; 4.6.1 Experiment Setup; 4.6.2 Summarized Results; 4.6.3 Detailed Analysis; 4.6.3.1 Apps with Simple Exploiting Paths; 4.6.3.2 Apps with Pop-Up Dialogs; 4.6.3.3 Apps with Selection Views; 4.6.3.4 Apps with Multiple Threads; References; 5 Efficient and Context-Aware Privacy Leakage Confinement ; 5.1 Introduction; 5.2 Approach Overview; 5.2.1 Key Techniques; 5.3 Context-Aware Policy; 5.3.1 Taint Propagation Trace; 5.3.2 Source and Sink Call-Sites; 5.3.3 Parameterized Source and Sink Pairs
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9783319478128
Media category
computer
Media MARC source
rdamedia
Media type code
c
Specific material designation
remote
System control number
  • SPR964293418
  • ocn964293418
Label
Android application security : a semantics and context-aware approach, Mu Zhang, Heng Yin
Publication
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Preface; Intended Audience; Acknowledgments; Contents; 1 Introduction ; 1.1 Security Threats in Android Applications; 1.1.1 Malware Attacks; 1.1.2 Software Vulnerabilities; 1.1.3 Information Leakage; 1.1.4 Insecure Descriptions; 1.2 A Semantics and Context Aware Approach to Android Application Security; References; 2 Background; 2.1 Android Application; 2.1.1 Android Framework API; 2.1.2 Android Permission; 2.1.3 Android Component; 2.1.4 Android App Description; 2.2 Android Malware Detection; 2.2.1 Signature Detection and Malware Analysis; 2.2.2 Android Malware Classification
  • 2.3 Android Application Vulnerabilities2.3.1 Component Hijacking Vulnerabilities; 2.3.2 Automatic Patch and Signature Generation; 2.3.3 Bytecode Rewriting; 2.3.4 Instrumentation Code Optimization; 2.4 Privacy Leakage in Android Apps; 2.4.1 Privacy Leakage Detection; 2.4.2 Privacy Leak Mitigation; 2.4.3 Information Flow Control; 2.5 Text Analytics for Android Security; 2.5.1 Automated Generation of Software Description; References; 3 Semantics-Aware Android Malware Classification; 3.1 Introduction; 3.2 Overview; 3.2.1 Problem Statement; 3.2.2 Architecture Overview
  • 3.3 Weighted Contextual API Dependency Graph3.3.1 Key Behavioral Aspects; 3.3.2 Formal Definition; 3.3.3 A Real Example; 3.3.4 Graph Generation; 3.3.4.1 Entry Point Discovery; 3.3.4.2 Constant Analysis; 3.3.4.3 API Dependency Construction; 3.4 Android Malware Classification; 3.4.1 Graph Matching Score; 3.4.2 Weight Assignment; 3.4.2.1 Selection of Critical API Labels; 3.4.2.2 Weight Assignment; 3.4.3 Implementation and Graph Database Query; 3.4.4 Malware Classification; 3.4.4.1 Anomaly Detection; 3.4.4.2 Signature Detection; 3.5 Evaluation; 3.5.1 Dataset and Experiment Setup
  • 3.5.2 Summary of Graph Generation3.5.3 Classification Results; 3.5.3.1 Signature Detection; 3.5.3.2 Anomaly Detection; 3.5.3.3 Detection of Transformation Attacks; 3.5.4 Runtime Performance; 3.5.5 Effectiveness of Weight Generation and Weighted Graph Matching; References; 4 Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks ; 4.1 Introduction; 4.2 Problem Statement and Approach Overview; 4.2.1 Running Example; 4.2.2 Problem Statement; 4.2.3 Approach Overview; 4.3 Taint Slice Computation; 4.3.1 Running Example; 4.4 Patch Statement Placement
  • 4.5 Patch Optimization4.5.1 Optimized Patch for Running Example; 4.6 Experimental Evaluation; 4.6.1 Experiment Setup; 4.6.2 Summarized Results; 4.6.3 Detailed Analysis; 4.6.3.1 Apps with Simple Exploiting Paths; 4.6.3.2 Apps with Pop-Up Dialogs; 4.6.3.3 Apps with Selection Views; 4.6.3.4 Apps with Multiple Threads; References; 5 Efficient and Context-Aware Privacy Leakage Confinement ; 5.1 Introduction; 5.2 Approach Overview; 5.2.1 Key Techniques; 5.3 Context-Aware Policy; 5.3.1 Taint Propagation Trace; 5.3.2 Source and Sink Call-Sites; 5.3.3 Parameterized Source and Sink Pairs
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9783319478128
Media category
computer
Media MARC source
rdamedia
Media type code
c
Specific material designation
remote
System control number
  • SPR964293418
  • ocn964293418

Library Locations

Processing Feedback ...