A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Towards Mining Comprehensive Android Sandboxes
2018
2018 23rd International Conference on Engineering of Complex Computer Systems (ICECCS)
s work by considering input parameters of many different types of API methods for mining a more comprehensive sandbox. ...
Recently, Jamrozik et al. proposed an approach, named Boxmate, to mine sandboxes to protect Android users from malicious behaviors. ...
Mining sandboxes for Android is firstly proposed by Jamrozik et al. ...
doi:10.1109/iceccs2018.2018.00014
dblp:conf/iceccs/LeB0GL18
fatcat:dkilurrdqfgxvnytia2h6t52im
Mining Sandboxes for Linux Containers
2017
2017 IEEE International Conference on Software Testing, Verification and Validation (ICST)
In this paper, we present an approach that mines sandboxes for containers. ...
In the experiment, our approach requires less than eleven minutes to mine sandbox for each of the containers. ...
Mined sandboxes require no further adjustment on use cases.
D. ...
doi:10.1109/icst.2017.16
dblp:conf/icst/WanLXCL17
fatcat:6evanmzty5genmp34yfmm3eqdi
Mining sandboxes: Are we there yet?
2018
2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)
Recently, Jamrozik et al. proposed a technique to secure Android applications referred to as mining sandboxes. ...
s work in two ways: (1) we evaluate the effectiveness of mining sandboxes on detecting malicious behaviors; (2) we investigate the effectiveness of multiple automated test case generation tools to mine ...
mine sandboxes. ...
doi:10.1109/saner.2018.8330231
dblp:conf/wcre/BaoLL18
fatcat:4hlopqdnnresjjdyjl3qqug3ou
Execution of Structured and Unstructured Mining in Automotive Industry Using Hortonworks Sandbox
2021
SN Computer Science
The paper illustrates the working of MapReduce technology that executes in the back end and is responsible for performing data mining. KIA sonet car is not getting delivered by KIA India team. ...
Different tools of Hortonworks Sandbox 2.2.0 such as File Browser, HCatalog, and Hive (Query Editor) have been used to perform data mining. ...
Apache Hadoop Framework (Hortonworks Hue 2.2.0) The use of Hortonworks-Sandbox 2.2.0 is made for data mining in the research paper. It requires at least 2 GB of RAM. ...
doi:10.1007/s42979-021-00692-8
fatcat:rqbplq6pknfyrkvzjacx2moxwm
Exploring the Use of Static and Dynamic Analysis to Improve the Performance of the Mining Sandbox Approach for Android Malware Identification
[article]
2021
arXiv
pre-print
Although the use of dynamic analysis for mining Android sandboxes has been empirically investigated before, little is known about the potential benefits of combining static analysis with the mining sandbox ...
The Android mining sandbox approach consists in running dynamic analysis tools on a benign version of an Android app and recording every call to sensitive APIs. ...
Recall that we build a sandbox during the exploratory phase of the mining sandbox approach. ...
arXiv:2109.06613v1
fatcat:2ybkuysal5hqhp3kakf54yhqbm
Mining Sandboxes
[article]
2018
Second, we apply a sandbox to limit any behavior during normal usage to the one discovered during mining. ...
Experiments conducted with BOXMATE show less than one hour is required to mine Android applications sandboxes, requiring few to no confirmations for frequently used functionality. ...
Sandbox mining, sandbox mining concept The idea introduced by this thesis, composed of two stages: mining and sandboxing. For details, see Chapter 3. ...
doi:10.22028/d291-27390
fatcat:w7mkmpwhenelnafc4s3myxbcum
Practical and effective sandboxing for Linux containers
2019
Empirical Software Engineering
The enforcement of mined sandboxes incurs low performance overhead. ...
In this paper, we present an approach that mines sandboxes and enables fine-grained sandbox enforcement for containers. ...
Mining sandbox for the Python container will be useless because the mined sandbox will be too coarse. ...
doi:10.1007/s10664-019-09737-2
fatcat:kvke3j7sfnarxmb44aop6guop4
Audible and visual representations of the signals from a seismic landmine detection system
2002
Journal of the Acoustical Society of America
, y=0
time (ms)
Visual Presentation; Waterfall Graph
Audible Presentation;
Sound File
ASA 2002
Waymond Scott, Georgia Tech
34
TS-50 Mine, 1.5 cm Deep, Sandbox
Audible Presentation;
Sound ...
displacement, y=0
time (ms)
TS-50 Mine, 6.0 cm Deep, Sandbox
Visual Presentation; Waterfall Graph
Audible Presentation;
Sound File
ASA 2002
Waymond Scott, Georgia Tech
37
US Government Test ...
doi:10.1121/1.4779383
fatcat:oads2jgxgzgr5l5k2ahonedpeq
Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis
2018
2018 Global Information Infrastructure and Networking Symposium (GIIS)
In this paper, we have analyzed Petya, Spyeye, VolatileCedar, PAFISH etc. through Agent-based and Agentless dynamic sandbox systems in order to investigate and benchmark their efficiency in advanced malware ...
techniques can be easily thwarted through polymorphic, metamorphic malware, obfuscation and packing techniques, whereas in dynamic analysis malware samples are executed in a controlled environment using the sandboxing ...
In [21] , in contrast to traditional techniques, the authors used iterative pattern mining to detect malware based on the assumption that malware do repetitive action on data sequence ranging from running ...
doi:10.1109/giis.2018.8635598
dblp:conf/giis/AliSPG18
fatcat:cg3s2pxcxvewzf25qfem3yylkq
Deep specification mining
2018
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis - ISSTA 2018
We also demonstrate the value of DSM in sandboxing Android apps. CCS CONCEPTS • Software and its engineering → Dynamic analysis; ...
We execute DSM to mine specifications of 11 target library classes. ...
The results indicate it is promising to employ FSAs mined by DSM to create more effective Android sandboxes. ...
doi:10.1145/3213846.3213876
dblp:conf/issta/LeL18
fatcat:zml42lemanehzlkgsswrhvzl6y
Developing symbolic capacity one step at a time
2008
Cognition
You need to make your sandbox look like mine. Your job is to take this big dot (handing the child the disc) and put it in your big sandbox so that it looks like mine''. ...
Then the child was turned back, handed the model and told, ''See this dot in my sandbox? Remember you have to make your sandbox look like mine. ...
doi:10.1016/j.cognition.2006.12.006
pmid:17280658
fatcat:o4iwchxhxrb7rgmka2f75auoie
A view on the methodology of analysis and exploration of marketing data
2017
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems
The paper proposes a methodology for the development of a marketing decision support system using Big Data technology and data mining techniques. ...
The main task is to collect pre-process data to be used by the tools and data mining algorithms. In the context of Big Data technology, the data is collected in so-called data sandboxes. ...
It should be noted that although the sandbox data is shared by data analysts and exploration modules, at the same time the sandbox platform has to ensure data security and confidentiality. ...
doi:10.15439/2017f442
dblp:conf/fedcsis/PondelK17
fatcat:n7txfam7qbe65bz7pvnslm3ybu
Scalable Learning Environments for Teaching Cybersecurity Hands-on
[article]
2021
arXiv
pre-print
Using the presented environments KYPO Cyber Range Platform and Cyber Sandbox Creator, we delivered the classes on-site or remotely for various target groups of learners (K-12, university students, and ...
Index Terms-cybersecurity education, interactive learning environment, sandbox, virtual machines, cyber range, educational data mining, learning analytics, learning technology
I. ...
Moreover, the approach enables learning analytics and educational data mining of learners' interactions with the environment. ...
arXiv:2110.10004v1
fatcat:ctgqbjs4yfd4rbjge3pwdpeise
Anomaly Detection on Android System
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Recently, the arc of digital ads has been extensively analyzed by scientists using machine learning and data mining techniques. ...
In addition, it leverages for this function two sandboxes, the authorization sandbox and the folder sandbox. ...
doi:10.35940/ijitee.a4951.119119
fatcat:wodnfsaxbjctrcnwgur67ofgki
Building malware classificators usable by State security agencies
2018
Iteckne
Sandboxing has been used regularly to analyze software samples and determine if these contain suspicious properties or behaviors. ...
This paper proposes two machine learning models able to classify samples based on signatures and permissions obtained through Cuckoo sandbox, Androguard and VirusTotal. ...
The machine learning models can be generated from data using Weka [21] , which contains a collection of machine learning algorithms for data mining. ...
doi:10.15332/iteckne.v15i2.2072
fatcat:nfeiawae5vd4hpci2dufnpeb2y
« Previous
Showing results 1 — 15 out of 4,345 results