A complete behavioral measurement and reporting: Optimized for mobile devices

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security is an important factor in today's IT infrastructure due to complex and vast variety of malware threats. One way to tackle these malware is via signaturebased techniques. However, this requires human effort in identification of threats and is not scalable. The second way is to detect malware via behavior-based reference monitor so called O-Day' malware. In this paper, we have optimized behavior-based technique for a specific use-case, based on today's enterprise requirement. We have built behavior-based light-weight reference monitor to measure and report a complete system call sequences as well as its arguments. The measurements are stored into Trusted Platform Module (TPM) protected location. The reference monitor splits the sequences of system calls and its arguments. Arguments and their verification is performed independent of each other via machine learning techniques. The behavior monitor is designed and developed on the core Linux Security Module (LSM). The same monitor is also designed and developed for Android-based platform via a newly built architecture called Android Security Module (ASM).

Cite

CITATION STYLE

APA

Ali, T., Zuhairi, M. F. A., Ali, J., Musa, S., & Nauman, M. (2017). A complete behavioral measurement and reporting: Optimized for mobile devices. In COMPSE 2016 - 1st EAI International Conference on Computer Science and Engineering. EAI. https://doi.org/10.4108/eai.27-2-2017.152252

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free