Dynamic code whitelist for efficient analysis of Android code

2018 
Recently, as the number of malicious codes targeting Android platform is increasing, various researches are conducted to analyze them. However, Android applications tend to include various 3rd-party libraries which makes difficult to accurate analysis and takes long time. In this paper, we propose a dynamic code whitelist structure that excludes unnecessary 3rd-party libraries code. By using the proposed structures, we can efficiently analyze the malicious code in Android applications.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []