dc.contributor.author |
Sawadogo, Zakaria |
|
dc.contributor.author |
Khan, Muhammad Taimoor |
|
dc.contributor.author |
Dembelle, Jean Marie |
|
dc.contributor.author |
Mendy, Gervais |
|
dc.contributor.author |
Ouya, Samuel |
|
dc.date.accessioned |
2024-02-22T13:38:25Z |
|
dc.date.available |
2024-02-22T13:38:25Z |
|
dc.date.issued |
2023-12-29 |
|
dc.identifier.uri |
https://repository.rsif-paset.org/xmlui/handle/123456789/359 |
|
dc.description |
Conference proceeding full text: https://doi.org/10.1109/CloudTech58737.2023.10366167 |
en_US |
dc.description.abstract |
Researchers are concerned about the detection of obfuscated Android malware, and multiple studies have been proposed to address certain obfuscation techniques. However, the comprehensive consideration of all obfuscation techniques remains a critical cybersecurity challenge due to their mutations. To tackle this issue, we developed the DeepMalOb approach, which utilizes memory dumping and deep learning with MLP to detect obfuscated malicious applications. Although the approach has yielded satisfactory results, we acknowledge potential security risks associated with MLPs, such as adversarial attacks, model inversion attacks, overfitting, and model biases, which may impact the accuracy and robustness of the MLP model and render it vulnerable to obfuscated malware. To improve the DeepMalOb approach, we propose the use of formal security risk analysis methods with MLP to detect hidden malware in Android by analyzing the security risks associated with the MLP model and the input features used for training. |
en_US |
dc.publisher |
IEEE Xplore |
en_US |
dc.subject |
Android malware detection , Obfuscation techniques , Deep learning , Cyber-security , Memory dump , formal method |
en_US |
dc.title |
Towards a DeepMalOb Improvement in the Use of Formal Security Risk Analysis Methods |
en_US |
dc.type |
Presentation |
en_US |