• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices


You Joung Ham, Hyung-Woo Lee, Journal of Internet Computing and Services, Vol. 15, No. 3, pp. 31-44, Jun. 2014
10.7472/jksii.2014.15.3.31, Full Text:
Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism

Abstract

Large number of Android mobile application has been developed and deployed through the Android open market by increasing android-based smart work device users recently. But, it has been discovered security vulnerabilities on malicious applications that are developed and deployed through the open market or 3rd party market. There are issues to leak user's personal and financial information in mobile devices to external server without the user's knowledge in most of malicious application inserted Trojan Horse forms of malicious code. Therefore, in order to minimize the damage caused by malignant constantly increasing malicious application, it is required a proactive detection mechanism development. In this paper, we analyzed the existing techniques' Pros and Cons to detect a malicious application and proposed discrimination and detection result using malicious application discrimination mechanism based on Jaccard similarity after collecting events occur in real-time execution on android-mobile devices.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Ham, Y. & Lee, H. (2014). Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices. Journal of Internet Computing and Services, 15(3), 31-44. DOI: 10.7472/jksii.2014.15.3.31.

[IEEE Style]
Y. J. Ham and H. Lee, "Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices," Journal of Internet Computing and Services, vol. 15, no. 3, pp. 31-44, 2014. DOI: 10.7472/jksii.2014.15.3.31.

[ACM Style]
You Joung Ham and Hyung-Woo Lee. 2014. Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices. Journal of Internet Computing and Services, 15, 3, (2014), 31-44. DOI: 10.7472/jksii.2014.15.3.31.