Due to its open source and large user base, Android has emerged as the most popular operating system. Android's popularity and openness have made it a prime target for malicious attackers. Permissions have received great attention from researchers because of their effectiveness in restricting applications’ access to sensitive resources. However, existing malware detection methods based on permissions are easily bypassed by inter-application resource access. To address these issues, we combine inter-application resource access-related intent features with permission features. Besides, we designed a customized convolutional neural network using two squeeze-and-excitation blocks to learn the inherent relationships between multi-type features. The two basic SE blocks perform squeezing operations based on average pooling and max pooling, respectively, to compute channel-wise attention from multiple perspectives. We designed a series of experiments based on real-world samples to evaluate the efficacy of the proposed framework. Empirical results demonstrate that our framework outperforms state-of-the-art methods, achieving an accuracy of 96.29%, precision of 97.52%, recall of 94.63%, F1-score of 96.06% and MCC of 92.60%. These promising experimental results consistently demonstrate that AMERDroid is an effective approach for Android malware detection.
{"title":"An effective attention and residual network for malware detection","authors":"Wei Gu, Hongyan Xing, Tianhao Hou","doi":"10.1049/cmu2.12754","DOIUrl":"https://doi.org/10.1049/cmu2.12754","url":null,"abstract":"<p>Due to its open source and large user base, Android has emerged as the most popular operating system. Android's popularity and openness have made it a prime target for malicious attackers. Permissions have received great attention from researchers because of their effectiveness in restricting applications’ access to sensitive resources. However, existing malware detection methods based on permissions are easily bypassed by inter-application resource access. To address these issues, we combine inter-application resource access-related intent features with permission features. Besides, we designed a customized convolutional neural network using two squeeze-and-excitation blocks to learn the inherent relationships between multi-type features. The two basic SE blocks perform squeezing operations based on average pooling and max pooling, respectively, to compute channel-wise attention from multiple perspectives. We designed a series of experiments based on real-world samples to evaluate the efficacy of the proposed framework. Empirical results demonstrate that our framework outperforms state-of-the-art methods, achieving an accuracy of 96.29%, precision of 97.52%, recall of 94.63%, F1-score of 96.06% and MCC of 92.60%. These promising experimental results consistently demonstrate that AMERDroid is an effective approach for Android malware detection.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 9","pages":"557-568"},"PeriodicalIF":1.6,"publicationDate":"2024-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12754","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141245923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the demand for data security and privacy protection has become increasingly prominent. Confidential computing emerges as a crucial security technology to solve security and privacy problem, and it is also a hot subject of in contemporary security technologies. Leveraging collaborative security in both hardware and software, it builds a trusted execution environment to ensure confidentiality and integrity protection for data in use. This paper provides a comprehensive overview of the development process of confidential computing, summarizing its current research status and issues, which focuses on the security requirements for data security and privacy protection. Furthermore, it deeply analyses the common technical features of confidential computing, and proposes a trusted confidential computing architecture based on collaborative hardware and software trust. Then, it elaborates on the research status and issues of confidential computing from four aspects: hardware security, architecture and key technologies, applications, and standards and evaluation. Finally, this paper provides a synthesis and outlook for the future development of confidential computing. In summary, confidential computing is currently in a rapidly developing stage and will play an important role in cyber security in the future.
{"title":"Survey of research on confidential computing","authors":"Dengguo Feng, Yu Qin, Wei Feng, Wei Li, Ketong Shang, Hongzhan Ma","doi":"10.1049/cmu2.12759","DOIUrl":"10.1049/cmu2.12759","url":null,"abstract":"<p>As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the demand for data security and privacy protection has become increasingly prominent. Confidential computing emerges as a crucial security technology to solve security and privacy problem, and it is also a hot subject of in contemporary security technologies. Leveraging collaborative security in both hardware and software, it builds a trusted execution environment to ensure confidentiality and integrity protection for data in use. This paper provides a comprehensive overview of the development process of confidential computing, summarizing its current research status and issues, which focuses on the security requirements for data security and privacy protection. Furthermore, it deeply analyses the common technical features of confidential computing, and proposes a trusted confidential computing architecture based on collaborative hardware and software trust. Then, it elaborates on the research status and issues of confidential computing from four aspects: hardware security, architecture and key technologies, applications, and standards and evaluation. Finally, this paper provides a synthesis and outlook for the future development of confidential computing. In summary, confidential computing is currently in a rapidly developing stage and will play an important role in cyber security in the future.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 9","pages":"535-556"},"PeriodicalIF":1.6,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12759","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140666234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yangyi Zhang, Xinrong Guan, Qingqing Wu, Zhi Ji, Yueming Cai
This paper investigates an intelligent reflecting surface (IRS) assisted downlink short packet transmission system, where an access point sends short packets to multiple devices with the help of an IRS. Specifically, a performance comparison between the frequency division multiple access and time division multiple access is conducted for the considered system, from the perspective of average age of information (AoI). To minimize the maximum average AoI among all devices, the resource allocation and passive beamforming are jointly optimized. However, the formulated problem is difficult to solve due to the non-convex objective function and coupled variables. Thus, an alternating optimization based algorithm is proposed by exploiting the semidefinite relaxation and bisection search techniques. Simulation results show that time division multiple access can achieve lower AoI by exploiting the time-selective passive beamforming of IRS for maximizing the signal to noise ratio of each device consecutively. Moreover, it also shows that as the length of information bits becomes sufficiently large as compared to the available bandwidth, the proposed frequency division multiple access transmission scheme becomes more favourable due to more flexible power allocation.
{"title":"Resource allocation and passive beamforming for IRS-assisted short packet systems","authors":"Yangyi Zhang, Xinrong Guan, Qingqing Wu, Zhi Ji, Yueming Cai","doi":"10.1049/cmu2.12763","DOIUrl":"10.1049/cmu2.12763","url":null,"abstract":"<p>This paper investigates an intelligent reflecting surface (IRS) assisted downlink short packet transmission system, where an access point sends short packets to multiple devices with the help of an IRS. Specifically, a performance comparison between the frequency division multiple access and time division multiple access is conducted for the considered system, from the perspective of average age of information (AoI). To minimize the maximum average AoI among all devices, the resource allocation and passive beamforming are jointly optimized. However, the formulated problem is difficult to solve due to the non-convex objective function and coupled variables. Thus, an alternating optimization based algorithm is proposed by exploiting the semidefinite relaxation and bisection search techniques. Simulation results show that time division multiple access can achieve lower AoI by exploiting the time-selective passive beamforming of IRS for maximizing the signal to noise ratio of each device consecutively. Moreover, it also shows that as the length of information bits becomes sufficiently large as compared to the available bandwidth, the proposed frequency division multiple access transmission scheme becomes more favourable due to more flexible power allocation.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 10","pages":"612-618"},"PeriodicalIF":1.6,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12763","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140668189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}