12 research outputs found
Malware Analysis and Detection on Android: The Big Challenge
The popularization of the use of mobile devices, such as smartphones and tablets, has accelerated in recent years, as these devices have experienced a reduction in cost together with an increase in functionality and services availability. In this context, due to its openness and free availability, Android operating system (OS) has become not only a major stakeholder in the market of mobile devices but has also become an attractive target for cybercriminals. In this chapter, we advocate to present some current trends and results in the Android malware analysis and detection research area. We start by briefly describing the Android’s security model, followed by a discussion of the static and dynamic malware analysis techniques in order to provide a general view of the analysis and detection process to the reader. After that, a description of a particular set of software developments, which exemplify some of the discussed techniques, is presented accompanied by a set of practical results. Finally, we draw some conclusions about the future development of the Android malware analysis area. The main contribution of this chapter is a description of the realization of static and dynamic malware analysis techniques and principles that can be automated and mapped to software system tools in order to simplify analyses. Moreover, some details about the use of machine learning algorithms for malware classifications and the use of the hooking software techniques for dynamic analysis execution are provided
Diapositivas Clase 2 Ciberseguridad CIC-IPN
Cibersegurida
PRÁCTICA 1 DE LABORATORIO: INSTALACIÓN DE PAQUETES EN LINUX CENTOS 7 (revisión 1)
PRÁCTICA 1 DE LABORATORIO: INSTALACIÓN DE PAQUETES EN LINUX CENTOS 7, Revisión
Dispositivas curso Ciberseguridad A17@CIC-IPN, primera sección
Diapositivas del primer bloque de sesiones del curso A17 en el CIC-IP
Laboratorio de Ciberseguridad CISEG CIC IPN
Brochure del Laboratorio de Ciberseguridad CIC-IP
PRÁCTICA 1 DE LABORATORIO: INSTALACIÓN DE PAQUETES EN LINUX CENTOS 7
DOCUMENTO GUÍA DE PRÁCTICA 1 DE LABORATORIO: INSTALACIÓN DE PAQUETES EN LINUX CENTOS
Temario Tópicos Selectos de la Computación: Introducción a la Criptografía
Temario de Curso 2012 de Introducción a la Criptografía (Temas selectos de la computació
Diapositivas Clase 1 Ciberseguridad CIC-IPN
Cibersegurida