Jeongwoo Choi, Yongmin Kim, Jinwoo Lee, Jiman Hong
{"title":"动态代码白名单,用于有效分析Android代码","authors":"Jeongwoo Choi, Yongmin Kim, Jinwoo Lee, Jiman Hong","doi":"10.1145/3264746.3264812","DOIUrl":null,"url":null,"abstract":"Recently, as the number of malicious codes targeting Android platform is increasing, various researches are conducted to analyze them. However, Android applications tend to include various 3rd-party libraries which makes difficult to accurate analysis and takes long time. In this paper, we propose a dynamic code whitelist structure that excludes unnecessary 3rd-party libraries code. By using the proposed structures, we can efficiently analyze the malicious code in Android applications.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"116 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Dynamic code whitelist for efficient analysis of Android code\",\"authors\":\"Jeongwoo Choi, Yongmin Kim, Jinwoo Lee, Jiman Hong\",\"doi\":\"10.1145/3264746.3264812\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, as the number of malicious codes targeting Android platform is increasing, various researches are conducted to analyze them. However, Android applications tend to include various 3rd-party libraries which makes difficult to accurate analysis and takes long time. In this paper, we propose a dynamic code whitelist structure that excludes unnecessary 3rd-party libraries code. By using the proposed structures, we can efficiently analyze the malicious code in Android applications.\",\"PeriodicalId\":186790,\"journal\":{\"name\":\"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems\",\"volume\":\"116 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3264746.3264812\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3264746.3264812","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Dynamic code whitelist for efficient analysis of Android code
Recently, as the number of malicious codes targeting Android platform is increasing, various researches are conducted to analyze them. However, Android applications tend to include various 3rd-party libraries which makes difficult to accurate analysis and takes long time. In this paper, we propose a dynamic code whitelist structure that excludes unnecessary 3rd-party libraries code. By using the proposed structures, we can efficiently analyze the malicious code in Android applications.