LEADER 01207nam--2200385---450- 001 990003695090203316 005 20121004140620.0 010 $a978-0-8020-9325-7 035 $a000369509 035 $aUSA01000369509 035 $a(ALEPH)000369509USA01 035 $a000369509 100 $a20121004d2007----km-y0itay50------ba 101 2 $agrc$aeng 102 $aCA 105 $a||||||||001yy 200 1 $aFragments and testimonia$fAnaxagoras of Clazomenae$ga text and translation with notes and essays by Patricia Curd 210 $aToronto [etc.]$cUniversity of Toronto Press$d2007 215 $aXIV, 279 p.$d24 cm 225 2 $aPhoenix presocratics 225 2 $aPhoenix$iSupplementary volumes 410 0$12001$aPhoenix presocratics 410 0$12001$aPhoenix$iSupplementary volumes 676 $a188 700 1$aANAXAGORAS$0164250 702 1$aCURD,$bPatricia 801 0$aIT$bsalbc$gISBD 912 $a990003695090203316 951 $aII.1.A. 1565$b238543 L.M.$cII.1.A.$d00059037 959 $aBK 969 $aUMA 979 $aPASSARO$b90$c20121004$lUSA01$h1403 979 $aPASSARO$b90$c20121004$lUSA01$h1406 996 $aFragments and testimonia$91141972 997 $aUNISA LEADER 07327nam 2200493 450 001 9910492141603321 005 20231110232641.0 010 $a3-030-74664-X 035 $a(CKB)4100000011979332 035 $a(MiAaPQ)EBC6676431 035 $a(Au-PeEL)EBL6676431 035 $a(OCoLC)1260343458 035 $a(PPN)26030056X 035 $a(EXLCZ)994100000011979332 100 $a20220327d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aAndroid malware detection using machine learning $edata-driven fingerprinting and threat intelligence /$fElMouatez Billah Karbab [and three others] 210 1$aCham, Switzerland :$cSpringer,$d[2021] 210 4$d©2021 215 $a1 online resource (212 pages) 225 1 $aAdvances in Information Security ;$vv.86 311 $a3-030-74663-1 327 $aIntro -- Contents -- List of Figures -- List of Tables -- 1 Introduction -- 1.1 Motivations -- 1.2 Objectives -- 1.3 Research Contributions -- 1.4 Book Organization -- References -- 2 Background and Related Work -- 2.1 Background -- 2.1.1 Android OS Overview -- 2.1.1.1 Android Apk Format -- 2.1.1.2 Android Markets -- 2.1.2 Android Security -- 2.1.2.1 Android Security Threats -- 2.1.2.2 Design Challenges of Malware Detection Systems -- 2.2 Android Malware Detection Overview -- 2.3 Taxonomy of Android Malware Detection Systems -- 2.3.1 Malware Threats -- 2.3.2 Detection System Deployment -- 2.4 Performance Criteria for Malware Detection -- 2.4.1 Feature Selection -- 2.4.2 Detection Strategy -- 2.5 General Malware Threat Detection -- 2.5.1 Workstation-Based Solutions -- 2.5.2 Mobile-Based Solutions -- 2.5.3 Hybrid Solutions -- 2.5.4 Discussions -- 2.6 Specific Malware Threat Detection -- 2.6.1 Workstation-Based Solutions -- 2.6.2 Mobile-Based Solutions -- 2.6.3 Hybrid Solutions -- 2.6.4 Discussions -- 2.7 Android Malware Detection Helpers -- 2.7.1 Discussions -- 2.8 Summary -- References -- 3 Fingerprinting Android Malware Packages -- 3.1 Approximate Static Fingerprint -- 3.1.1 Fingerprint Structure -- 3.1.2 Fingerprints Generation -- 3.1.2.1 N-grams -- 3.1.2.2 Feature Hashing -- 3.1.2.3 Fingerprint Computation Process -- 3.1.2.4 Compute Fingerprints Similarity -- 3.2 Malware Detection Framework -- 3.2.1 Peer-Fingerprint Voting -- 3.2.2 Peer-Matching -- 3.2.2.1 Family-Fingerprinting -- 3.3 Experimental Results -- 3.3.1 Testing Setup -- 3.3.2 Evaluation Results -- 3.3.2.1 Family-Fingerprinting Results -- 3.3.2.2 Peer-Matching Results -- 3.3.2.3 Peer-Voting vs Merged Fingerprints -- 3.3.3 Discussion -- 3.4 Summary -- References -- 4 Robust Android Malicious Community Fingerprinting -- 4.1 Threat Model -- 4.2 Usage Scenarios -- 4.3 Clustering Process. 327 $a4.4 Static Features -- 4.4.1 N-grams -- 4.4.1.1 Classes.dex Byte N-grams -- 4.4.1.2 Assembly Opcodes N-grams -- 4.4.2 Native Library N-grams -- 4.4.2.1 APK N-grams -- 4.4.3 Manifest File Features -- 4.4.4 Android API Calls -- 4.4.5 Resources -- 4.4.6 APK Content Types -- 4.4.7 Feature Preprocessing -- 4.5 LSH Similarity Computation -- 4.6 Community Detection -- 4.7 Community Fingerprint -- 4.8 Experimental Results -- 4.8.1 Dataset and Test Setup -- 4.8.1.1 App Detection Metrics -- 4.8.1.2 Community Detection Metrics -- 4.8.2 Mixed Dataset Results -- 4.8.3 Results of Malware-Only Datasets -- 4.8.4 Community Fingerprint Results -- 4.9 Hyper-Parameter Analyses -- 4.9.1 Purity Analysis -- 4.9.2 Coverage Analysis -- 4.9.3 Number of Communities Analysis -- 4.9.4 Efficiency Analysis -- 4.10 Case Study: Recall and Precision Settings -- 4.11 Case Study: Obfuscation -- 4.12 Summary -- References -- 5 Android Malware Fingerprinting Using Dynamic Analysis -- 5.1 Threat Model -- 5.2 Overview -- 5.2.1 Notation -- 5.3 Methodology -- 5.3.1 Behavioral Reports Generation -- 5.3.2 Report Vectorization -- 5.3.3 Build Models -- 5.3.4 Ensemble Composition -- 5.3.5 Ensemble Prediction Process -- 5.4 MalDy Framework -- 5.4.1 Machine Learning Algorithms -- 5.5 Evaluation Results -- 5.5.1 Evaluation Datasets -- 5.5.2 Effectiveness -- 5.5.2.1 Classifier Effect -- 5.5.2.2 Effect of the Vectorization Technique -- 5.5.2.3 Effect of Tuning Hyper-Parameters -- 5.5.3 Portability -- 5.5.3.1 MalDy on Win32 Malware -- 5.5.3.2 MalDy Train Dataset Size -- 5.5.4 Efficiency -- 5.6 Summary -- References -- 6 Fingerprinting Cyber-Infrastructures of Android Malware -- 6.1 Threat Model -- 6.2 Usage Scenarios -- 6.3 Methodology -- 6.3.1 Threat Communities Detection -- 6.3.2 Action Prioritization -- 6.3.2.1 PageRank Algorithm -- 6.3.3 Security Correlation. 327 $a6.3.3.1 Network Enrichment Using Passive DNS -- 6.3.3.2 Threat Network Tagging -- 6.4 Experimental Results -- 6.4.1 Android Malware Dataset -- 6.4.2 Implementation -- 6.4.3 Drebin Threat Network -- 6.4.4 Family Threat Networks -- 6.5 Summary -- References -- 7 Portable Supervised Malware Fingerprinting Using Deep Learning -- 7.1 Threat Model -- 7.2 Usage Scenarios -- 7.3 Methodology -- 7.3.1 MalDozer Method Embedding -- 7.3.2 MalDozer Neural Network -- 7.3.3 Implementation -- 7.4 Evaluation -- 7.4.1 Datasets -- 7.4.2 Malware Detection Performance -- 7.4.2.1 Unknown Malware Detection -- 7.4.2.2 Resiliency Against API Evolution Over Time -- 7.4.2.3 Resiliency Against Changing the Order of API Methods -- 7.4.3 Family Attribution Performance -- 7.4.4 Runtime Performance -- 7.4.4.1 Model Complexity Evaluation -- 7.5 Summary -- References -- 8 Resilient and Adaptive Android Malware Fingerprinting and Detection -- 8.1 Methodology -- 8.1.1 Approach -- 8.1.2 Android App Representation -- 8.1.3 Malware Detection -- 8.1.3.1 Fragment Detection -- 8.1.3.2 Inst2Vec Embedding -- 8.1.3.3 Classification Model -- 8.1.3.4 Dataset Notation -- 8.1.3.5 Detection Ensemble -- 8.1.3.6 Confidence Analysis -- 8.1.3.7 PetaDroid Adaptation Mechanism -- 8.1.4 Malware Clustering -- 8.1.4.1 InstNGram2Vec -- 8.1.4.2 Deep Neural Auto-Encoder and Digest Generation -- 8.1.4.3 Malware Family Clustering -- 8.1.5 Implementation -- 8.2 Evaluation -- 8.2.1 Android Dataset -- 8.2.2 Malware Detection -- 8.2.2.1 Detection Performance -- 8.2.2.2 Dataset Size Effect -- 8.2.2.3 Ensemble Size Effect -- 8.2.3 Family Clustering -- 8.2.4 Obfuscation Resiliency -- 8.2.5 Change Over Time Resiliency -- 8.2.6 PetaDroid Automatic Adaptation -- 8.2.7 Efficiency -- 8.3 Comparative Study -- 8.3.1 Detection Performance Comparison -- 8.3.2 Efficiency Comparison -- 8.3.3 Time Resiliency Comparison. 327 $a8.4 Case Studies -- 8.4.1 Scalable Detection -- 8.4.2 Scalable Automatic Adaptation -- 8.5 Summary -- References -- 9 Conclusion -- 9.1 Concluding Remarks -- 9.2 Lessons Learned -- 9.3 Future Research Directions -- References -- Index. 410 0$aAdvances in Information Security 606 $aMalware (Computer software)$xPrevention 606 $aComputer security$xStandards 615 0$aMalware (Computer software)$xPrevention. 615 0$aComputer security$xStandards. 676 $a005.8 702 $aKarbab$b ElMouatez Billah 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910492141603321 996 $aAndroid malware detection using machine learning$92814852 997 $aUNINA LEADER 02139nam0 22003853i 450 001 MIL0296850 005 20251003044231.0 100 $a19960731d1955 ||||0itac50 ba 101 | $aita 102 $ait 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $aˆI ‰dirigenti di azienda nella vita del paese$edieci anni di ascesa$e1944-1955$fConfederazione italiana dirigenti di azienda, Roma 210 $a[S.l.$cs.n.$d1955?]$eRoma$gSocietà grafica romana 215 $a794 p.$cill.$d25 cm. 676 $a658.4$9GESTIONE IN GENERALE. QUADRI DIRIGENTI E INTERMEDI$v20 676 $a658.400 6$9$v20 676 $a658.421$9GESTIONE ESECUTIVA. ALTA DIRIGENZA. GESTIONE INPRENDITORIALE$v23 686 $aIT/3430.0$cECONOMIA E SOCIETA ITALIA 1945-1968$2R 686 $aIT/3436.0$cLAVORO SINDACATI DEI LAVORATORI ITALIA 1945-1968$2R 686 $aIT/3436.8$cORGANIZZAZIONI SINDACALI E ALTRE ITALIA 1945-1968$2R 686 $aIT/3438.3$cCETI IMPRENDITORIALI ITALIA 1945-1968$2R 686 $aIT/3438.4$cITALIA 1968-1989 IMPIEGATI E TECNICI$2R 710 02$aConfederazione italiana dirigenti di azienda$3TO0V062869$4070$0123707 791 02$aC.I.D.A.$c $3CFIV148038$zConfederazione italiana dirigenti di azienda 791 02$aConfederazione italiana dei dirigenti di azienda$3SBNV007933$zConfederazione italiana dirigenti di azienda 791 02$aConfederazione italiana dirigenti d'azienda$3SBNV007934$zConfederazione italiana dirigenti di azienda 801 3$aIT$bIT-000000$c19960731 850 $aIT-BN0095 901 $bNAP 01$cPOZZO LIB.$nVi sono collocati fondi di economia, periodici di ingegneria e scienze, periodici di economia e statistica e altri fondi comprendenti documenti di economia pervenuti in dono. 912 $aMIL0296850 950 0$aBiblioteca Centralizzata di Ateneo$b1 v.$c1 v.$d 01POZZO LIB.ECON MON 7703$e 0101 0070053975E VMA 1 v. (Precedente collocazione G 5397)$fB $h20220829$i20220829 977 $a 01 996 $aDirigenti di azienda nella vita del paese$92906474 997 $aUNISANNIO