885
views
0
recommends
+1 Recommend
1 collections
    8
    shares
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Mobile devices forensic platform for malware detection

      proceedings-article

      , , , , ,

      6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR)

      Cyber Security Research

      10th-12th September 2019

      Malware, mobile terminal, forensic tools, security

      Bookmark

            Content

            Author and article information

            Contributors
            Conference
            September 2019
            September 2019
            : 59-66
            Affiliations
            BEIA Consult International

            Bucharest, Romania
            University Politehnica of Bucharest

            Bucharest, Romania
            Article
            10.14236/ewic/icscsr19.8
            4f6d7afb-c255-41f5-8a1b-5eaa2b1da16f
            © George Suciu et al. Published by BCS Learning and Development Ltd. 6th International Symposium for ICS & SCADA Cyber Security Research 2019

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            6th International Symposium for ICS & SCADA Cyber Security Research 2019
            ICS-CSR
            6
            Athens, Greece
            10th-12th September 2019
            Electronic Workshops in Computing (eWiC)
            Cyber Security Research
            Product
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            REFERENCES

            1. 2018 DroidDetector: a traffic-based platform to detect android malware using machine learning Third International Workshop on Pattern Recognition [Cross Ref]

            2. 2017 HEMD: a highly efficient random forest-based malware detection framework for Android Neural Computing and Applications 30 11 3353 3361 [Cross Ref]

            3. 2018 Attack Detection Application with Attack Tree for Mobile System using Log Analysis Mobile Networks and Applications 24 1 184 192 [Cross Ref]

            4. 2016 Cyber Forensic Tools: A Review International Journal of Engineering Trends and Technology 41 5 266 271

            5. 2015 Forensic Acquisitions of WhatsApp Data on Popular Mobile Platforms 2015 Sixth International Conference on Emerging Security Technologies (EST) [Cross Ref]

            6. Reveal the Truth Retrieved May 4 2019 from https://www.blackbagtech.com/

            7. Empowering Collection to Analysis Excellence Retrieved May 4 2019 from http://accessdata.com/

            8. Most Trusted Endpoint Detection & Response Solution Retrieved May 4 2019 from https://www.guidancesoftware.com/

            9. Magnet AXIOM - Digital Investigation Platform May 4 2019 from https://www.magnetforensics.com/products/magnet-axiom/

            10. Paraben Device Seizure May 4 2019 from https://www.sciencedirect.com/topics/computer-science/paraben-device-seizure

            11. Forensic Solutions May 4 2019 from https://www.mobiledit.com/forensic-solutions

            12. Retrieved May 6 2019 from https://belkasoft.com/ec

            13. The Pioneers of Mobile Forensics May 6 2019 from https://www.msab.com/

            14. Retrieved May 7 2019 from https://www.sleuthkit.org/autopsy/

            15. DEFT - A DFIR Toolkit Retrieved May 10 2019 from http://www.deftlinux.net/

            16. Welcome · Santoku Linux Retrieved May 10 2019 from https://santoku-linux.com/

            17. C.A.IN.E. Retrieved May 10 2019 from http://www.caine-live.net/

            18. PALADIN Retrieved May 11 2019 from https://sumuri.com/software/paladin/

            19. [MobiSec] Mobile Security Testing Live Environment Retrieved May 14 2019 from https://www.kitploit.com/2014/03/mobisec-mobile-security-testing-live.html

            20. What is Bro? [Overview and Resources] 2018 June 6 May 12 2019 from https://bricata.com/blog/what-is-bro-ids/

            21. maltrail - Malicious Traffic Detection System Retrieved May 12 2019 from https://www.darknet.org.uk/2017/06/maltrail-malicious-traffic-detection-system/

            22. Android Penetration Tools Walkthrough Series: MobSF 2019 March 11 May 11 2019 from https://resources.infosecinstitute.com/android-penetration-tools-walkthrough-series-mobsf/#gref

            23. CuckooDroid Book Retrieved May 11 2019 from https://cuckoo-droid.readthedocs.io/en/latest/

            24. Docker Enterprise Container Platform Retrieved May 8 2019 from https://www.docker.com/products/docker-enterprise

            25. About Retrieved May 9 2019 from https://www.postgresql.org/about/

            26. Open-Source Virtualization Platform Retrieved May 11 2019 from https://www.proxmox.com/en/proxmox-ve

            27. What is Kubernetes Retrieved May 11 2019 from https://kubernetes.io/docs/concepts/overview/what-is-kubernetes/

            28. What’s LXC? Retrieved May 10 2019 from https://linuxcontainers.org/lxc/introduction/

            29. Apache Kafka Retrieved May 9 2019 from http://kafka.apache.org/

            30. Elasticsearch Retrieved May 9 2019 from https://www.elastic.co/products/elasticsearch

            31. The Zeek Network Security Monitor Retrieved May 11 2019 from https://www.bro.org/

            32. 2019 May 4 stamparm/maltrail. Retrieved May 11 2019 from https://github.com/stamparm/maltrail

            33. idanr1986 2017 July 25 idanr1986/cuckoo-droid Retrieved May 11 2019 from https://github.com/idanr1986/cuckoo-droid

            34. MobSF 2019 May 4 MobSF/Mobile-Security-Framework-MobSF Retrieved May 11 2019 from https://github.com/MobSF/Mobile-Security-Framework-MobSF

            Comments

            Comment on this article