首页 > 最新文献

EURASIP Journal on Information Security最新文献

英文 中文
Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves 通过软件保护扩展(SGX)飞地上的私有算法管理机密性泄漏
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-09-05 DOI: 10.1186/s13635-019-0091-5
Kubilay Ahmet Küçük, D. Grawrock, Andrew C. Martin
{"title":"Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves","authors":"Kubilay Ahmet Küçük, D. Grawrock, Andrew C. Martin","doi":"10.1186/s13635-019-0091-5","DOIUrl":"https://doi.org/10.1186/s13635-019-0091-5","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"42 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2019-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-019-0091-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65683882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Situation prediction of large-scale Internet of Things network security 大规模物联网网络安全态势预测
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-08-28 DOI: 10.1186/s13635-019-0097-z
Wenjun Yang, Jiaying Zhang, Chundong Wang, Xiuliang Mo
The Internet of Things (IoT) is a new technology rapidly developed in various fields in recent years. With the continuous application of the IoT technology in production and life, the network security problem of IoT is increasingly prominent. In order to meet the challenges brought by the development of IoT technology, this paper focuses on network security situational awareness. The network security situation awareness is basic of IoT network security. Situation prediction of network security is a kind of time series forecasting problem in essence. So it is necessary to construct a modification function that is suitable for time series data to revise the kernel function of traditional support vector machine (SVM). An improved network security situation awareness model for IoT is proposed in this paper. The sequence kernel support vector machine is obtained and the particle swarm optimization (PSO) method is used to optimize related parameters. It proves that the method is feasible by collecting the boundary data of a university campus IoT network. Finally, a comparison with the PSO-SVM is made to prove the effectiveness of this method in improving the accuracy of network security situation prediction of IoT. The experimental results show that PSO-time series kernel support vector machine is better than the PSO-Gauss kernel support vector machine in network security situation prediction. The application of the Hadoop platform also enhances the efficiency of data processing.
物联网(Internet of Things, IoT)是近年来在各个领域迅速发展起来的一项新技术。随着物联网技术在生产和生活中的不断应用,物联网的网络安全问题日益突出。为了应对物联网技术发展带来的挑战,本文重点研究网络安全态势感知。网络安全态势感知是物联网网络安全的基础。网络安全态势预测本质上是一种时间序列预测问题。因此,有必要构造适合于时间序列数据的修正函数来修正传统支持向量机(SVM)的核函数。提出了一种改进的物联网网络安全态势感知模型。得到序列核支持向量机,并采用粒子群优化方法对相关参数进行优化。通过对某高校校园物联网边界数据的采集,验证了该方法的可行性。最后,通过与PSO-SVM的比较,证明了该方法在提高物联网网络安全态势预测精度方面的有效性。实验结果表明,pso -时间序列核支持向量机在网络安全态势预测方面优于pso -高斯核支持向量机。Hadoop平台的应用也提高了数据处理的效率。
{"title":"Situation prediction of large-scale Internet of Things network security","authors":"Wenjun Yang, Jiaying Zhang, Chundong Wang, Xiuliang Mo","doi":"10.1186/s13635-019-0097-z","DOIUrl":"https://doi.org/10.1186/s13635-019-0097-z","url":null,"abstract":"The Internet of Things (IoT) is a new technology rapidly developed in various fields in recent years. With the continuous application of the IoT technology in production and life, the network security problem of IoT is increasingly prominent. In order to meet the challenges brought by the development of IoT technology, this paper focuses on network security situational awareness. The network security situation awareness is basic of IoT network security. Situation prediction of network security is a kind of time series forecasting problem in essence. So it is necessary to construct a modification function that is suitable for time series data to revise the kernel function of traditional support vector machine (SVM). An improved network security situation awareness model for IoT is proposed in this paper. The sequence kernel support vector machine is obtained and the particle swarm optimization (PSO) method is used to optimize related parameters. It proves that the method is feasible by collecting the boundary data of a university campus IoT network. Finally, a comparison with the PSO-SVM is made to prove the effectiveness of this method in improving the accuracy of network security situation prediction of IoT. The experimental results show that PSO-time series kernel support vector machine is better than the PSO-Gauss kernel support vector machine in network security situation prediction. The application of the Hadoop platform also enhances the efficiency of data processing.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"182 ","pages":"1-9"},"PeriodicalIF":3.6,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Crowdsourcing for click fraud detection 众包点击欺诈检测
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-07-22 DOI: 10.1186/s13635-019-0095-1
Riwa Mouawi, I. Elhajj, A. Chehab, A. Kayssi
{"title":"Crowdsourcing for click fraud detection","authors":"Riwa Mouawi, I. Elhajj, A. Chehab, A. Kayssi","doi":"10.1186/s13635-019-0095-1","DOIUrl":"https://doi.org/10.1186/s13635-019-0095-1","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"2019 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2019-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-019-0095-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65683897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Fine-grain watermarking for intellectual property protection 用于知识产权保护的细粒度水印
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-07-12 DOI: 10.1186/s13635-019-0094-2
S. Rizzo, Flavio Bertini, D. Montesi
{"title":"Fine-grain watermarking for intellectual property protection","authors":"S. Rizzo, Flavio Bertini, D. Montesi","doi":"10.1186/s13635-019-0094-2","DOIUrl":"https://doi.org/10.1186/s13635-019-0094-2","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"2019 1","pages":"1-20"},"PeriodicalIF":3.6,"publicationDate":"2019-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-019-0094-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45201463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Towards the application of recommender systems to secure coding 浅谈推荐系统在安全编码中的应用
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-06-13 DOI: 10.1186/s13635-019-0092-4
Fitzroy D. Nembhard, Marco M. Carvalho, Thomas C. Eskridge
Secure coding is crucial for the design of secure and efficient software and computing systems. However, many programmers avoid secure coding practices for a variety of reasons. Some of these reasons are lack of knowledge of secure coding standards, negligence, and poor performance of and usability issues with existing code analysis tools. Therefore, it is essential to create tools that address these issues and concerns. This article features the proposal, development, and evaluation of a recommender system that uses text mining techniques, coupled with IntelliSense technology, to recommend fixes for potential vulnerabilities in program code. The resulting system mines a large code base of over 1.6 million Java files using the MapReduce methodology, creating a knowledge base for a recommender system that provides fixes for taint-style vulnerabilities. Formative testing and a usability study determined that surveyed participants strongly believed that a recommender system would help programmers write more secure code.
安全编码对于设计安全高效的软件和计算系统至关重要。然而,许多程序员由于各种原因而避免安全编码实践。其中一些原因是缺乏安全编码标准的知识,疏忽,以及现有代码分析工具的性能差和可用性问题。因此,创建处理这些问题和关注点的工具是必要的。本文介绍了一个推荐系统的建议、开发和评估,该系统使用文本挖掘技术和智能感知技术,为程序代码中的潜在漏洞提供修复建议。由此产生的系统使用MapReduce方法挖掘了超过160万个Java文件的大型代码库,为推荐系统创建了知识库,该知识库提供了对污染类型漏洞的修复。形成性测试和可用性研究确定,被调查的参与者强烈相信推荐系统将帮助程序员编写更安全的代码。
{"title":"Towards the application of recommender systems to secure coding","authors":"Fitzroy D. Nembhard, Marco M. Carvalho, Thomas C. Eskridge","doi":"10.1186/s13635-019-0092-4","DOIUrl":"https://doi.org/10.1186/s13635-019-0092-4","url":null,"abstract":"Secure coding is crucial for the design of secure and efficient software and computing systems. However, many programmers avoid secure coding practices for a variety of reasons. Some of these reasons are lack of knowledge of secure coding standards, negligence, and poor performance of and usability issues with existing code analysis tools. Therefore, it is essential to create tools that address these issues and concerns. This article features the proposal, development, and evaluation of a recommender system that uses text mining techniques, coupled with IntelliSense technology, to recommend fixes for potential vulnerabilities in program code. The resulting system mines a large code base of over 1.6 million Java files using the MapReduce methodology, creating a knowledge base for a recommender system that provides fixes for taint-style vulnerabilities. Formative testing and a usability study determined that surveyed participants strongly believed that a recommender system would help programmers write more secure code.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"211 1","pages":"1-24"},"PeriodicalIF":3.6,"publicationDate":"2019-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A new method of generating hard random lattices with short bases 一种生成短基硬随机格的新方法
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-06-10 DOI: 10.1186/s13635-019-0088-0
Chengli Zhang, Wenping Ma, Hefeng Chen, Feifei Zhao
This paper first gives a regularity theorem and its corollary. Then, a new construction of generating hard random lattices with short bases is obtained by using this corollary. This construction is from a new perspective and uses a random matrix whose entries obeyed Gaussian sampling which ensures that the corresponding schemes have a wider application future in cryptography area. Moreover, this construction is more specific than the previous constructions, which makes it can be implemented easier in practical applications.
本文首先给出了一个正则性定理及其推论。然后,利用这一推论得到了一种生成短基硬随机格的新构造。这种结构从一个新的角度出发,使用了一个随机矩阵,其条目服从高斯采样,保证了相应的方案在密码学领域有更广阔的应用前景。此外,这种结构比以前的结构更具体,这使得它在实际应用中更容易实现。
{"title":"A new method of generating hard random lattices with short bases","authors":"Chengli Zhang, Wenping Ma, Hefeng Chen, Feifei Zhao","doi":"10.1186/s13635-019-0088-0","DOIUrl":"https://doi.org/10.1186/s13635-019-0088-0","url":null,"abstract":"This paper first gives a regularity theorem and its corollary. Then, a new construction of generating hard random lattices with short bases is obtained by using this corollary. This construction is from a new perspective and uses a random matrix whose entries obeyed Gaussian sampling which ensures that the corresponding schemes have a wider application future in cryptography area. Moreover, this construction is more specific than the previous constructions, which makes it can be implemented easier in practical applications.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"198 1","pages":"1-8"},"PeriodicalIF":3.6,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Metadata filtering for user-friendly centralized biometric authentication 元数据过滤,用户友好的集中生物识别认证
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-06-06 DOI: 10.1186/s13635-019-0093-3
Christian Gehrmann, Marcus Rodan, Niklas Jönsson
While biometric authentication for commercial use so far mainly has been used for local device unlock use cases, there are great opportunities for using it also for central authentication such as for remote login. However, many current biometric sensors like for instance mobile fingerprint sensors have too large false acceptance rate (FAR) not allowing them, for security reasons, to be used in larger user group for central identification purposes. A straightforward way to avoid this FAR problem is to either request a user unique identifier such as a device identifier or require the user to enter a unique user ID prior to making the biometric matching. Usage of a device identifier does not work when a user desires to authenticate on a previously unused device of a generic type. Furthermore, requiring the user at each login occasion to enter a unique user ID, is not at all user-friendly. To avoid this problem, we in this paper investigate an alternative, most user-friendly approach, for identification in combination with biometric-based authentication using metadata filtering. An evaluation of the adopted approach is carried out using realistic simulations of the Swedish population to assess the feasibility of the proposed system. The results show that metadata filtering in combination with traditional biometric-based matching is indeed a powerful tool for providing reliable, and user-friendly, central authentication services for large user groups.
到目前为止,商业用途的生物识别身份验证主要用于本地设备解锁用例,但也有很大的机会将其用于远程登录等中央身份验证。然而,目前许多生物识别传感器,如移动指纹传感器,由于安全原因,错误接受率(FAR)太大,不允许在较大的用户群体中用于集中识别目的。避免此FAR问题的一种直接方法是请求用户唯一标识符(如设备标识符),或者要求用户在进行生物识别匹配之前输入唯一的用户ID。当用户希望在以前未使用的泛型设备上进行身份验证时,设备标识符的使用不起作用。此外,要求用户在每次登录时都输入唯一的用户ID,这一点都不方便用户使用。为了避免这个问题,我们在本文中研究了一种替代的,最用户友好的方法,将识别与使用元数据过滤的基于生物特征的身份验证相结合。对所采用的方法进行了评估,使用瑞典人口的现实模拟来评估拟议系统的可行性。结果表明,元数据过滤与传统的基于生物特征的匹配相结合,确实是一种强大的工具,可以为大型用户群提供可靠的、用户友好的中央认证服务。
{"title":"Metadata filtering for user-friendly centralized biometric authentication","authors":"Christian Gehrmann, Marcus Rodan, Niklas Jönsson","doi":"10.1186/s13635-019-0093-3","DOIUrl":"https://doi.org/10.1186/s13635-019-0093-3","url":null,"abstract":"While biometric authentication for commercial use so far mainly has been used for local device unlock use cases, there are great opportunities for using it also for central authentication such as for remote login. However, many current biometric sensors like for instance mobile fingerprint sensors have too large false acceptance rate (FAR) not allowing them, for security reasons, to be used in larger user group for central identification purposes. A straightforward way to avoid this FAR problem is to either request a user unique identifier such as a device identifier or require the user to enter a unique user ID prior to making the biometric matching. Usage of a device identifier does not work when a user desires to authenticate on a previously unused device of a generic type. Furthermore, requiring the user at each login occasion to enter a unique user ID, is not at all user-friendly. To avoid this problem, we in this paper investigate an alternative, most user-friendly approach, for identification in combination with biometric-based authentication using metadata filtering. An evaluation of the adopted approach is carried out using realistic simulations of the Swedish population to assess the feasibility of the proposed system. The results show that metadata filtering in combination with traditional biometric-based matching is indeed a powerful tool for providing reliable, and user-friendly, central authentication services for large user groups.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"179 1","pages":"1-17"},"PeriodicalIF":3.6,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Accuracy enhancement of biometric recognition using iterative weights optimization algorithm 基于迭代权重优化算法的生物特征识别精度提高
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-05-28 DOI: 10.1186/s13635-019-0089-z
Pallavi Deshpande, P. Mukherji, A. Tavildar
{"title":"Accuracy enhancement of biometric recognition using iterative weights optimization algorithm","authors":"Pallavi Deshpande, P. Mukherji, A. Tavildar","doi":"10.1186/s13635-019-0089-z","DOIUrl":"https://doi.org/10.1186/s13635-019-0089-z","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":" ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2019-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-019-0089-z","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41821182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A deep learning framework for predicting cyber attacks rates 用于预测网络攻击率的深度学习框架
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-05-22 DOI: 10.1186/s13635-019-0090-6
Xing Fang, Maochao Xu, Shouhuai Xu, Peng Zhao
Like how useful weather forecasting is, the capability of forecasting or predicting cyber threats can never be overestimated. Previous investigations show that cyber attack data exhibits interesting phenomena, such as long-range dependence and high nonlinearity, which impose a particular challenge on modeling and predicting cyber attack rates. Deviating from the statistical approach that is utilized in the literature, in this paper we develop a deep learning framework by utilizing the bi-directional recurrent neural networks with long short-term memory, dubbed BRNN-LSTM. Empirical study shows that BRNN-LSTM achieves a significantly higher prediction accuracy when compared with the statistical approach.
就像天气预报是多么有用一样,预测或预测网络威胁的能力永远不会被高估。以往的研究表明,网络攻击数据呈现出一些有趣的现象,如长期依赖性和高度非线性,这对网络攻击率的建模和预测提出了特殊的挑战。与文献中使用的统计方法不同,在本文中,我们通过利用具有长短期记忆的双向循环神经网络(称为BRNN-LSTM)开发了一个深度学习框架。实证研究表明,与统计方法相比,BRNN-LSTM的预测精度显著提高。
{"title":"A deep learning framework for predicting cyber attacks rates","authors":"Xing Fang, Maochao Xu, Shouhuai Xu, Peng Zhao","doi":"10.1186/s13635-019-0090-6","DOIUrl":"https://doi.org/10.1186/s13635-019-0090-6","url":null,"abstract":"Like how useful weather forecasting is, the capability of forecasting or predicting cyber threats can never be overestimated. Previous investigations show that cyber attack data exhibits interesting phenomena, such as long-range dependence and high nonlinearity, which impose a particular challenge on modeling and predicting cyber attack rates. Deviating from the statistical approach that is utilized in the literature, in this paper we develop a deep learning framework by utilizing the bi-directional recurrent neural networks with long short-term memory, dubbed BRNN-LSTM. Empirical study shows that BRNN-LSTM achieves a significantly higher prediction accuracy when compared with the statistical approach.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"202 1","pages":"1-11"},"PeriodicalIF":3.6,"publicationDate":"2019-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Machine learning-based dynamic analysis of Android apps with improved code coverage 基于机器学习的Android应用动态分析,提高代码覆盖率
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-04-29 DOI: 10.1186/s13635-019-0087-1
Suleiman Y. Yerima, Mohammed K. Alzaylaee, Sakir Sezer
This paper investigates the impact of code coverage on machine learning-based dynamic analysis of Android malware. In order to maximize the code coverage, dynamic analysis on Android typically requires the generation of events to trigger the user interface and maximize the discovery of the run-time behavioral features. The commonly used event generation approach in most existing Android dynamic analysis systems is the random-based approach implemented with the Monkey tool that comes with the Android SDK. Monkey is utilized in popular dynamic analysis platforms like AASandbox, vetDroid, MobileSandbox, TraceDroid, Andrubis, ANANAS, DynaLog, and HADM. In this paper, we propose and investigate approaches based on stateful event generation and compare their code coverage capabilities with the state-of-the-practice random-based Monkey approach. The two proposed approaches are the state-based method (implemented with DroidBot) and a hybrid approach that combines the state-based and random-based methods. We compare the three different input generation methods on real devices, in terms of their ability to log dynamic behavior features and the impact on various machine learning algorithms that utilize the behavioral features for malware detection. Experiments performed using 17,444 applications show that overall, the proposed methods provide much better code coverage which in turn leads to more accurate machine learning-based malware detection compared to the state-of- the- art approach.
本文研究了代码覆盖率对基于机器学习的Android恶意软件动态分析的影响。为了最大化代码覆盖率,Android上的动态分析通常需要生成事件来触发用户界面,并最大化地发现运行时行为特征。在大多数现有的Android动态分析系统中,常用的事件生成方法是使用Android SDK附带的Monkey工具实现的基于随机的方法。Monkey被用于流行的动态分析平台,如AASandbox, vetDroid, MobileSandbox, TraceDroid, Andrubis, ANANAS, DynaLog和HADM。在本文中,我们提出并研究了基于有状态事件生成的方法,并将其代码覆盖能力与基于随机的Monkey方法进行了比较。提出的两种方法是基于状态的方法(由DroidBot实现)和结合基于状态和基于随机的方法的混合方法。我们在真实设备上比较了三种不同的输入生成方法,包括它们记录动态行为特征的能力,以及对利用行为特征进行恶意软件检测的各种机器学习算法的影响。使用17,444个应用程序进行的实验表明,总的来说,所提出的方法提供了更好的代码覆盖率,这反过来又导致了更准确的基于机器学习的恶意软件检测,而不是最先进的方法。
{"title":"Machine learning-based dynamic analysis of Android apps with improved code coverage","authors":"Suleiman Y. Yerima, Mohammed K. Alzaylaee, Sakir Sezer","doi":"10.1186/s13635-019-0087-1","DOIUrl":"https://doi.org/10.1186/s13635-019-0087-1","url":null,"abstract":"This paper investigates the impact of code coverage on machine learning-based dynamic analysis of Android malware. In order to maximize the code coverage, dynamic analysis on Android typically requires the generation of events to trigger the user interface and maximize the discovery of the run-time behavioral features. The commonly used event generation approach in most existing Android dynamic analysis systems is the random-based approach implemented with the Monkey tool that comes with the Android SDK. Monkey is utilized in popular dynamic analysis platforms like AASandbox, vetDroid, MobileSandbox, TraceDroid, Andrubis, ANANAS, DynaLog, and HADM. In this paper, we propose and investigate approaches based on stateful event generation and compare their code coverage capabilities with the state-of-the-practice random-based Monkey approach. The two proposed approaches are the state-based method (implemented with DroidBot) and a hybrid approach that combines the state-based and random-based methods. We compare the three different input generation methods on real devices, in terms of their ability to log dynamic behavior features and the impact on various machine learning algorithms that utilize the behavioral features for malware detection. Experiments performed using 17,444 applications show that overall, the proposed methods provide much better code coverage which in turn leads to more accurate machine learning-based malware detection compared to the state-of- the- art approach.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"218 1","pages":"1-24"},"PeriodicalIF":3.6,"publicationDate":"2019-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
EURASIP Journal on Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1