Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 101986, 11 pages
http://dx.doi.org/10.1155/2014/101986
Research Article

SmartMal: A Service-Oriented Behavioral Malware Detection Framework for Mobile Devices

1Department of Computer Science, University of Science and Technology of China, Hefei 230027, China
2School of Software Engineering, University of Science and Technology of China, Suzhou 215123, China
3Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, ON, Canada

Received 14 March 2014; Accepted 2 June 2014; Published 5 August 2014

Academic Editor: Fei Yu

Copyright © 2014 Chao Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, ““Andromaly”: a behavioral malware detection framework for android devices,” Journal of Intelligent Information Systems, vol. 38, no. 1, pp. 161–190, 2012. View at Publisher · View at Google Scholar · View at Scopus
  2. Internet-Filter-Review, Top Ten Reviews, 2010, http://internet-filter-review.toptenreviews.com/.
  3. L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy, “Privilege escalation attacks on android,” in Proceedings of the 13th International Conference on Information Security, Springer, Boca Raton, Fla, USA, 2010.
  4. A. D. Schmidt, H. G. Schmidt, L. Batyuk et al., “Smartphone malware evolution revisited: android next target?” in Proceedig of the 4th International Conference on Malicious and Unwanted Software (MALWARE '09), pp. 1–7, canMontreal, Canada, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. D. Harel, A. Marron, and G. Weiss, “Behavioral programming,” Communications of the ACM, vol. 55, no. 7, pp. 90–100, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. J. Zhou, D. Pakkala, J. Perälä, E. Niemelä, J. Riekki, and M. Ylianttila, “Dependency-aware service oriented architecture and service composition,” in Proceedings of the IEEE International Conference on Web Services (ICWS '07), pp. 1146–1149, July 2007. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Cheng, S. H. Y. Wong, H. Yang, and S. Lu, “SmartSiren: virus detection and alert for smartphones,” in Proceedings of the 5th International Conference on Mobile Systems, Applications and Services (MobiSys '07), pp. 258–271, ACM, San Juan, Puerto Rico, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  8. T. K. Buennemeyer, T. M. Nelson, L. M. Clagett, J. P. Dunning, R. C. Marchany, and J. G. Tront, “Mobile device profiling and intrusion detection using smart batteries,” in proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS '08), p. 296, Waikoloa, Hawaii, USA, January 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Bose, X. Hu, K. G. Shin, and T. Park, “Behavioral detection of malware on mobile handsets,” in Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys '08), pp. 225–238, Breckenridge, Colo, USA, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  10. A. S. Shamili, C. Bauckhage, and T. Alpcan, “Malware detection on mobile devices using distributed machine learning,” in Proceedings of the 20th International Conference on Pattern Recognition (ICPR '10), pp. 4348–4351, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. A. D. Schmidt, R. Bye, H. G. Schmidt et al., “Static analysis of executables for collaborative malware detection on android,” in Proceedings of the IEEE International Conference on Communications (ICC '09), 2009.
  12. A. Schmidt, J. H. Clausen, A. Camtepe, and S. Albayrak, “Detecting symbian OS malware through static function call analysis,” in Proceedings of the 4th International Conference on Malicious and Unwanted Software (MALWARE '09), pp. 15–22, Montreal, Canada, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. T. Alpcan, C. Bauckhage, and A.-D. Schmidt, “A probabilistic diffusion scheme for anomaly detection on smartphones,” in Proceedings of the 4th IFIP WG 11.2 International Conference on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP '10), pp. 31–46, Springer, Passau, Germany, April 2010.
  14. C. A. Martínez, G. I. Echeverri, and A. G. Castillo Sanz, “Malware detection based on cloud computing integrating intrusion ontology representation,” in IEEE Latin-American Conference on Communications (LATINCOM '10), September 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, “Virtualized in-cloud security services for mobile devices,” in Proceedings of the 1st Workshop on Virtualization in Mobile Computing, ACM, Breckenridge, Colo, USA, 2008.
  16. W. Enck, P. Gilbert, B.-G. Chun et al., “TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones,” in Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, USENIX Association, Vancouver, Canada, 2010.
  17. M. Alam, M. Nauman, X. Zhang, T. Ali, and P. C. K. Hung, “Behavioral attestation for business processes,” in Proceedings of the IEEE International Conference on Web Services (ICWS '09), pp. 343–350, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  18. N. Fabian, B. Rainer, and K. Wolfgang, “Adaptive cache infrastructure: supporting dynamic program changes following dynamic program behavior,” in Proceedings of 9th Workshop on Parallel Systems and Algorithms (PASA '08), Dresden, Germany, 2008.
  19. C. Krintz and R. Wolski, “Using phase behavior in scientific application to guide linux operating system customization,” in Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS '05), IEEE Computer Society, April 2005. View at Publisher · View at Google Scholar · View at Scopus
  20. C. Wang, X. Li, P. Chen, J. Zhang, X. Feng, and X. Zhou, “Regarding processors and reconfigurable IP cores as services,” in Proceedings of the IEEE 9th International Conference on Services Computing (SCC '12), pp. 668–669, Honolulu, Hawaii, USA, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. D. Van Thanh and I. Jørstad, “A service-oriented architecture framework for mobile services,” in Proceedings of the Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop, pp. 65–71, IEEE, July 2005. View at Publisher · View at Google Scholar · View at Scopus
  22. A. Wang, C. Wang, X. Li, and X. Zhou, “SmartClass: a services-oriented approach for university resource scheduling,” in Proceedings of the 10th International Conference on Services Computing, 2013.
  23. M. K. Haki and M. W. Forte, “Service oriented enterprise architecture framework,” in Proceedings of the 6th World Congress on Services (SERVICES '10), pp. 391–398, Miami, Fla, USA, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  24. A. Wang, C. Wang, X. Li, and Z. Xuehai, “SOBA: a services oriented browser architecture with distributed URL-filtering mechanisms for teenagers,” in Proceedings of the IEEE World Congress on Services, 2013.
  25. I. M. Delamer and J. L. M. Lastra, “Service-oriented architecture for distributed publish/subscribe middleware in electronics production,” IEEE Transactions on Industrial Informatics, vol. 2, no. 4, pp. 281–294, 2006. View at Publisher · View at Google Scholar · View at Scopus
  26. J. Zhang, W. Tan, A. John, I. Foster, and R. Madduri, “Recommend-as-you-go: a novel approach supporting services-oriented scientific workflow reuse,” in Proceedings of the IEEE International Conference on Services Computing (SCC '11), pp. 48–55, IEEE Computer Society, July 2011. View at Publisher · View at Google Scholar · View at Scopus
  27. G. Kousiouris, D. Kyriazis, K. Konstanteli, S. Gogouvitis, G. Katsaros, and T. Varvarigou, “A service-oriented framework for GNU Octave-based performance prediction,” in Proceedings of the IEEE International Conference on Services Computing (SCC '10), pp. 114–121, Miami, Fla, USA, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  28. Y. Achbany, I. J. Jureta, S. Faulkner, and F. Fouss, “Continually learning optimal allocations of services to tasks,” IEEE Transactions on Services Computing, vol. 1, no. 3, pp. 141–154, 2008. View at Publisher · View at Google Scholar · View at Scopus
  29. C. Wang, Z. Wu, A. Wang, X. Li, F. Yang, and X. Zhou, “SmartMal: a service-oriented behavioral malware detection framework for smartphones,” in Proceedings of the IEEE 10th International Conference on High Performance Computing and Communications & IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC '13), pp. 329–336, Zhangjiajie, China, November 2013. View at Publisher · View at Google Scholar