0% found this document useful (0 votes)
43 views

My-Network Security Presentation

The document summarizes a research paper presentation on network security. The objectives are to introduce the selected research paper, review the paper, and discuss the paper's conclusions and areas for future work. The paper analyzed methods for detecting Android malware through disassembly and visualization. It proposed analyzing suspected apps for similarity to known malware families to detect and remove malware from operating systems.

Uploaded by

Arvind Lal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

My-Network Security Presentation

The document summarizes a research paper presentation on network security. The objectives are to introduce the selected research paper, review the paper, and discuss the paper's conclusions and areas for future work. The paper analyzed methods for detecting Android malware through disassembly and visualization. It proposed analyzing suspected apps for similarity to known malware families to detect and remove malware from operating systems.

Uploaded by

Arvind Lal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

National institute of Technical teachers training and Research,

Sector 26, Chandigarh.

PRESENTATION
OF
NETWORK SECURITY
DATE OF PRESENTATION : 23/06/2016

Presented by
Arvind Lal (141407)
ME-MODULAR-2014
7/8/16 08:27:47 AM

".

OBJECTIVES OF PRESENTATION

1 .IN TR O D U C TI O N

( EX PL AIN IN G

TH E MEA N IN G O F R E SEA R C H PAP ER

SE L EC T ED ) .
2 . R EVI EW O F R E SEA R C H PAPE R .
3 .C O N C L U S IO N AN D F U TU R E SC O PE O F R ESE AR C H PAPER .

7/8/16 08:27:47 AM

1. INTRODUCTION(RESEARCH PAPER SELECTED)


TOPIC

Analyzing and detecting method of Android Malware via


Disassembling and Visualization
PUBLISHED IN

International Journal of Cyber-Security and Digital Forensics (IJCSDF)


FROM

The Society of Digital Information and Wireless Communications, 2013 (ISSN: 2305-0012)

7/8/16 08:27:47 AM

2. R E VIE W OF RE SE A RC H PAPE R

PAPER IS DIVIDED INTO FOUR SECTIONS, NAMELY:

A. Introduction.
B. Related works.
C. Proposed approaches.
D. Conclusion and future work.

7/8/16 08:27:47 AM

A.INTRODUCTION OF TOPIC
IN THIS PAPER RESEARCHERS DONE THE FOLLOWING THINGS:
They tried to explain about the scenarios in security problem like:- a new kind of war takes
place between the security community and malicious software developers.
They also highlighted about the works done till date for stopping security breaching in
mobile apps and in computer systems like :- the security specialists use all possible
techniques, methods and strategies to stop and remove the threats while the malware
developers utilize new types of malwares that bypass implemented security features.
So, researchers has done thorough study and closely looked into malware, to understand the
definition, types, propagation of malware, and detecting/defending mechanisms in order to
contribute to the process of protection and security enhancement.
Author has propose a method of analyzing and deciding malware on the basis of similarity
with existing malware families on the popular platform, Android and other OS.
To remove the malware from the system, researcher focus on the checking visual similarity
among other malware families to help distributing to inspector appropriately.
7/8/16 08:27:47 AM

B .

R E L A TE D

W O R K S .

To solve the Android and other OS malware problems, following researchers has also
taken similar initiatives like:
(i) Zhou finds that 86.0% of malwares are repackaged in diverse ways, that is hackers
disassemble existing malwares or legitimate(real) apps, enclose malicious ( mischiefs )
payloads, and then re-assemble and submit the new apps or update apps to official third party
Android or other OS market.
(ii) M.Cho- proposed AndroScope technique which is a performance analysis tool for the
Android platform and other OS which provides a trace mechanism for tracing of core libraries,
android libraries, windows libraries and even Linux kernels. This tool enables viewer to load
the trace file and display basic information like enter and exit times of each method.
(iii)J.Ko-propsed techniques to determine similarity of Android and other OS application via
reversing and k-gram birthmarking. In this technique he develop a system to identify
software reuse illegally, then this system decompiles the apps and make the birthmarks based
on k-gram and determines the similarity between the sample apps by comparing the
birthmarks.

7/8/16 08:27:47 AM

C. PROPOSED APPROACHES

In this paper researcher has designed new system to detect and remove the malware from the O.S by the technique
called CFG(Call Flow Graph). With the help of this, researcher visualize characteristics of application, by selecting the
representative CFG from each family and then suspected applications are checked on the basis of degree of similarity.
Then according to the degree of similarity, malwares are distributed to the inspectors discriminately according to the level
of difficulty appropriately.
In this system there are four sub-systema. System of making CFGs of known malware families,
b. System of selection of representative of malware families,
c. System of making CFG of suspected application, and
d. System of measuring similarity and distribution malware to inspector.
The above system should work efficiently and appropriately, he proposed the rules for measuring
difficulty are as follows:
i. Inverse proportion to the number of application in each known malware family.
ii. Proportion to the appearance frequency within the limited time of the last in each known malware
family.
iii. Inverse proportion to the number of application in a known malware family.
iv. Proportion to whether to apply the code obfuscation(confusion).
7/8/16 08:27:47 AM

v. Inverse proportion to the degree of similarity among the known malware families.

D .

C O N C L U S I O N

A N D

F E A T U R E

W O R K .

This work presents the method of detecting an Android malware with visualization of application and
measuring similarity among known malware families. Also, he proposed that malware is distributed to
various inspectors discriminately according to degree of difficulty to analyze. In particular, he suggested the
rules for measuring difficulty. In the future, he plan to develop this system and apply in real-world.

7/8/16 08:27:47 AM

REFERENCES

[1] Yajin Zhou, Xuxian Jiang, Dissecting Android Malware : Characterization and Evolution
Proceeding 33rd IEEE Symposium Security and Privacy, 2012
[2] AndroScope: An insightful performance analyzer for all software layers of the android-based
systems, ETRI Journal, 2013
[3] Traceview, http://developer.android.com/tools/help/traceview.html
[4] J. Ko, et al. Measuring Similarity of Android Applications via Reversing and K-gram
Birthmarking, RACS13 pp.336-341, Oct, 2013
[5] L. Zager, Graph similarity amd matching, MS Thesis, EECS, MIT, 2005.

7/8/16 08:27:47 AM

Thank you
&
query session
7/8/16 08:27:47 AM

10

You might also like