12 research outputs found

    Malware Analysis and Detection on Android: The Big Challenge

    Get PDF
    The popularization of the use of mobile devices, such as smartphones and tablets, has accelerated in recent years, as these devices have experienced a reduction in cost together with an increase in functionality and services availability. In this context, due to its openness and free availability, Android operating system (OS) has become not only a major stakeholder in the market of mobile devices but has also become an attractive target for cybercriminals. In this chapter, we advocate to present some current trends and results in the Android malware analysis and detection research area. We start by briefly describing the Android’s security model, followed by a discussion of the static and dynamic malware analysis techniques in order to provide a general view of the analysis and detection process to the reader. After that, a description of a particular set of software developments, which exemplify some of the discussed techniques, is presented accompanied by a set of practical results. Finally, we draw some conclusions about the future development of the Android malware analysis area. The main contribution of this chapter is a description of the realization of static and dynamic malware analysis techniques and principles that can be automated and mapped to software system tools in order to simplify analyses. Moreover, some details about the use of machine learning algorithms for malware classifications and the use of the hooking software techniques for dynamic analysis execution are provided

    Diapositivas Clase 2 Ciberseguridad CIC-IPN

    No full text
    Cibersegurida

    PRÁCTICA 1 DE LABORATORIO: INSTALACIÓN DE PAQUETES EN LINUX CENTOS 7 (revisión 1)

    No full text
    PRÁCTICA 1 DE LABORATORIO: INSTALACIÓN DE PAQUETES EN LINUX CENTOS 7, Revisión

    Dispositivas curso Ciberseguridad A17@CIC-IPN, primera sección

    No full text
    Diapositivas del primer bloque de sesiones del curso A17 en el CIC-IP

    Laboratorio de Ciberseguridad CISEG CIC IPN

    No full text
    Brochure del Laboratorio de Ciberseguridad CIC-IP

    PRÁCTICA 1 DE LABORATORIO: INSTALACIÓN DE PAQUETES EN LINUX CENTOS 7

    No full text
    DOCUMENTO GUÍA DE PRÁCTICA 1 DE LABORATORIO: INSTALACIÓN DE PAQUETES EN LINUX CENTOS

    Diseño de un protocolo de autenticidad para redes de sensores

    No full text

    Diapositivas Clase 1 Ciberseguridad CIC-IPN

    No full text
    Cibersegurida

    Temario Tópicos Selectos de la Computación: Introducción a la Criptografía

    No full text
    Temario de Curso 2012 de Introducción a la Criptografía (Temas selectos de la computació
    corecore