Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2018 (2018), Article ID 9250297, 13 pages
https://doi.org/10.1155/2018/9250297
Research Article

Behavior Intention Derivation of Android Malware Using Ontology Inference

1Beijing Key Laboratory of Internet Culture and Digital Dissemination Research, Beijing Information Science and Technology University, Beijing, China
2School of Computer Science, Beijing Information Science and Technology University, Beijing, China

Correspondence should be addressed to Jian Jiao; nc.ude.utsib@naijoaij

Received 2 November 2017; Revised 26 January 2018; Accepted 20 February 2018; Published 1 April 2018

Academic Editor: Ahmad K. Malik

Copyright © 2018 Jian Jiao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Guojun, L. Jingwen, and S. Runkang, “Research and Progress of Android malware detection,” Journal of Wuhan University (Science Edition), vol. 61, no. 1, pp. 21–33, 2015. View at Google Scholar
  2. A. Kharraz, S. Arshad, C. Mulliner et al., “A Large-Scale, Automated Approach to Detecting,” in Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), pp. 757–772, USENIX Association, 2016.
  3. M.-Y. Su and K.-T. Fung, “Detection of android malware by static analysis on permissions and sensitive functions,” in Proceedings of the 8th International Conference on Ubiquitous and Future Networks, ICUFN 2016, pp. 873–875, Austria, July 2016. View at Publisher · View at Google Scholar · View at Scopus
  4. S. Arzt, S. Rasthofer, C. Fritz et al., “FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps,” ACM Sigplan Notices, vol. 49, no. 6, pp. 259–269, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. E. Bratman Michael, “What is intention?” in Intentions in communication, P. R. Cohen, Ed., pp. 15–32, the MIT Press, 1990. View at Google Scholar
  6. J. Shirley and D. Evans, “The user is not the enemy: Fighting malware by tracking user intentions,” in Proceedings of the New Security Paradigms Workshop 2008, NSPW '08, pp. 33–45, USA, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  7. C.-T. Jung, C.-H. Sun, and M. Yuan, “An ontology-enabled framework for a geospatial problem-solving environment,” Computers, Environment and Urban Systems, vol. 38, no. 1, pp. 45–57, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. I. Horrocks, F. P. Patel-Schneider, H. Boley et al., SWRL: A Semantic Web Rule Language Combining OWL and RuleML, W3C Member Submission, 2004.
  9. J. Bak, C. Jedrzejek, and M. Falkowski, “Usage of the jess engine, rules and ontology to query a relational database,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 5858, pp. 216–230, 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. X.-Y. Du, M. Li, and S. Wang, “Survey on ontology learning research,” Ruan Jian Xue Bao/Journal of Software, vol. 17, no. 9, pp. 1837–1847, 2006. View at Publisher · View at Google Scholar · View at Scopus
  11. S. Cheng, S. Luo, Z. Li et al., “Static Detection of Dangerous Behaviors in Android Apps,” in Proceedings of the the 5th international symposium on cyberspace safety and security, Springer International Publishing, 2013.
  12. IDA pro. http://www.hex-rays.com/products/ida.
  13. J. Jian and X. Qing, “On case auto generation using reverse analysis for Android malware,” Journal of HeFei University of Technology (Natural Science Edition), vol. 39, no. 4, pp. 466–470, 2016. View at Google Scholar
  14. W. Yang, X. Xiao, B. Andow, S. Li, T. Xie, and W. Enck, “AppContext: differentiating malicious and benign mobile app behaviors using context,” in Proceedings of the 37th IEEE/ACM International Conference on Software Engineering (ICSE '15), vol. 1, pp. 303–313, IEEE, May 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. Y. Li, T. Shen, X. Sun et al., “Detection, Classification and Characterization of Android Malware Using API Data De-pendency,” in Proceedings of the International Conference on Security and Privacy in Communication Systems, vol. 164, pp. 23–40, Springer International Publishing, 2015.
  16. M. Zhang, Y. Duan, H. Yin, and Z. Zhao, “Semantics-aware Android malware classification using weighted contextual API dependency graphs,” in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS '14), pp. 1105–1116, ACM, Scottsdale, Ariz, USA, November 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. P. Wu, H. Changzhen, and Y. Shuping, “A dynamic intrusive intention recognition method based on timed automata,” Journal of Computer Research and Development, vol. 48, no. 7, pp. 1288–1297, 2011. View at Google Scholar · View at Scopus
  18. J.-H. Han, S.-J. Lee, and J.-H. Kim, “Behavior Hierarchy-Based Affordance Map for Recognition of Human Intention and Its Application to Human-Robot Interaction,” IEEE Transactions on Human-Machine Systems, vol. 46, no. 5, pp. 708–722, 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. K. Tam, S. J. Khan, A. Fattori et al., “CopperDroid: automatic reconstruction of android malware behaviors,” in Proceedings of the Network and Distributed System Security Symposium, San Diego, Calif, USA, 2015. View at Publisher · View at Google Scholar
  20. M. Zhang and H. Yin, “Automatic Generation of Security-Centric Descriptions for Android Apps,” in Android Application Security, Springer International Publishing, 2016. View at Publisher · View at Google Scholar
  21. Z. Wang, C. Li, Z. Yuan, Y. Guan, and Y. Xue, “DroidChain: A novel Android malware detection method based on behavior chains,” Pervasive and Mobile Computing, vol. 32, pp. 3–14, 2016. View at Publisher · View at Google Scholar · View at Scopus
  22. X. Guozhi, System science and Engineering Research, Shanghai science and Technology Education Press, 2001.
  23. Y. Zhou and X. Jiang, “Dissecting android malware: characterization and evolution,” in Proceedings of the 33rd IEEE Symposium on Security and Privacy, pp. 95–109, IEEE, 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. http://copperdroid.isg.rhul.ac.uk/copperdroid/index.php.
  25. http://appscan.360.cn/.