Skip to Main Content (Press Enter)

Logo CNR
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills

UNI-FIND
Logo CNR

|

UNI-FIND

cnr.it
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills
  1. Outputs

Visualizing the outcome of dynamic analysis of Android malware with VizMal

Academic Article
Publication Date:
2020
abstract:
Malware detection techniques based on signature extraction require security analysts to manually inspect samples to find evidences of malicious behavior. This time-consuming task received little attention by researchers and practitioners, as most of the effort is on the identification as malware or non-malware of an entire sample. There are no tools for supporting the analyst in identifying when the malicious behavior occurs, given a sample. In this paper we propose VizMal, a tool able to visualize the execution traces of Android applications and to highlight which portions of the traces correspond to a potentially malicious behavior. The aim of VizMal is twofold: assisting the malware analyst during the inspection of an application and pushing the research community to organize and focus its effort on the malicious behavior localization. VizMal is able to discern if the application behavior during each second of execution are legitimate or malicious and to show this information in a simple and understandable way. We validate VizMal experimentally and by means of a user study: the results are promising and confirm that the tool can be useful.
Iris type:
01.01 Articolo in rivista
Keywords:
Malware analysis; Android; Machine Learning; Multiple Instance
List of contributors:
Mercaldo, Francesco; Martinelli, Fabio
Authors of the University:
MARTINELLI FABIO
Handle:
https://iris.cnr.it/handle/20.500.14243/379708
Published in:
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
Journal
  • Overview

Overview

URL

http://www.scopus.com/inward/record.url?eid=2-s2.0-85075537411&partnerID=q2rCbXpz
  • Use of cookies

Powered by VIVO | Designed by Cineca | 26.5.0.0 | Sorgente dati: PREPROD (Ribaltamento disabilitato)