4,345 Hits in 1.6 sec

Towards Mining Comprehensive Android Sandboxes

Tien-Duy B. Le, Lingfeng Bao, David Lo, Debin Gao, Li Li
2018 2018 23rd International Conference on Engineering of Complex Computer Systems (ICECCS)  
s work by considering input parameters of many different types of API methods for mining a more comprehensive sandbox.  ...  Recently, Jamrozik et al. proposed an approach, named Boxmate, to mine sandboxes to protect Android users from malicious behaviors.  ...  Mining sandboxes for Android is firstly proposed by Jamrozik et al.  ... 
doi:10.1109/iceccs2018.2018.00014 dblp:conf/iceccs/LeB0GL18 fatcat:dkilurrdqfgxvnytia2h6t52im

Mining Sandboxes for Linux Containers

Zhiyuan Wan, David Lo, Xin Xia, Liang Cai, Shanping Li
2017 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST)  
In this paper, we present an approach that mines sandboxes for containers.  ...  In the experiment, our approach requires less than eleven minutes to mine sandbox for each of the containers.  ...  Mined sandboxes require no further adjustment on use cases. D.  ... 
doi:10.1109/icst.2017.16 dblp:conf/icst/WanLXCL17 fatcat:6evanmzty5genmp34yfmm3eqdi

Mining sandboxes: Are we there yet?

Lingfeng Bao, Tien-Duy B. Le, David Lo
2018 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)  
Recently, Jamrozik et al. proposed a technique to secure Android applications referred to as mining sandboxes.  ...  s work in two ways: (1) we evaluate the effectiveness of mining sandboxes on detecting malicious behaviors; (2) we investigate the effectiveness of multiple automated test case generation tools to mine  ...  mine sandboxes.  ... 
doi:10.1109/saner.2018.8330231 dblp:conf/wcre/BaoLL18 fatcat:4hlopqdnnresjjdyjl3qqug3ou

Execution of Structured and Unstructured Mining in Automotive Industry Using Hortonworks Sandbox

Sukhpreet Singh, Gagandeep Jagdev
2021 SN Computer Science  
The paper illustrates the working of MapReduce technology that executes in the back end and is responsible for performing data mining. KIA sonet car is not getting delivered by KIA India team.  ...  Different tools of Hortonworks Sandbox 2.2.0 such as File Browser, HCatalog, and Hive (Query Editor) have been used to perform data mining.  ...  Apache Hadoop Framework (Hortonworks Hue 2.2.0) The use of Hortonworks-Sandbox 2.2.0 is made for data mining in the research paper. It requires at least 2 GB of RAM.  ... 
doi:10.1007/s42979-021-00692-8 fatcat:rqbplq6pknfyrkvzjacx2moxwm

Exploring the Use of Static and Dynamic Analysis to Improve the Performance of the Mining Sandbox Approach for Android Malware Identification [article]

Francisco Handrick da Costa, Ismael Medeiros, Thales Menezes, João Victor da Silva, Ingrid Lorraine da Silva, Rodrigo Bonifácio, Krishna Narasimhan, Márcio Ribeiro
2021 arXiv   pre-print
Although the use of dynamic analysis for mining Android sandboxes has been empirically investigated before, little is known about the potential benefits of combining static analysis with the mining sandbox  ...  The Android mining sandbox approach consists in running dynamic analysis tools on a benign version of an Android app and recording every call to sensitive APIs.  ...  Recall that we build a sandbox during the exploratory phase of the mining sandbox approach.  ... 
arXiv:2109.06613v1 fatcat:2ybkuysal5hqhp3kakf54yhqbm

Mining Sandboxes [article]

Konrad Jamrozik, Universität Des Saarlandes, Universität Des Saarlandes
Second, we apply a sandbox to limit any behavior during normal usage to the one discovered during mining.  ...  Experiments conducted with BOXMATE show less than one hour is required to mine Android applications sandboxes, requiring few to no confirmations for frequently used functionality.  ...  Sandbox mining, sandbox mining concept The idea introduced by this thesis, composed of two stages: mining and sandboxing. For details, see Chapter 3.  ... 
doi:10.22028/d291-27390 fatcat:w7mkmpwhenelnafc4s3myxbcum

Practical and effective sandboxing for Linux containers

Zhiyuan Wan, David Lo, Xin Xia, Liang Cai
2019 Empirical Software Engineering  
The enforcement of mined sandboxes incurs low performance overhead.  ...  In this paper, we present an approach that mines sandboxes and enables fine-grained sandbox enforcement for containers.  ...  Mining sandbox for the Python container will be useless because the mined sandbox will be too coarse.  ... 
doi:10.1007/s10664-019-09737-2 fatcat:kvke3j7sfnarxmb44aop6guop4

Audible and visual representations of the signals from a seismic landmine detection system

Waymond R. Scott, Gregg D. Larson, James S. Martin
2002 Journal of the Acoustical Society of America  
, y=0 time (ms) Visual Presentation; Waterfall Graph Audible Presentation; Sound File ASA 2002 Waymond Scott, Georgia Tech 34 TS-50 Mine, 1.5 cm Deep, Sandbox Audible Presentation; Sound  ...  displacement, y=0 time (ms) TS-50 Mine, 6.0 cm Deep, Sandbox Visual Presentation; Waterfall Graph Audible Presentation; Sound File ASA 2002 Waymond Scott, Georgia Tech 37 US Government Test  ... 
doi:10.1121/1.4779383 fatcat:oads2jgxgzgr5l5k2ahonedpeq

Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis

Muhammad Ali, Stavros Shiaeles, Maria Papadaki, Bogdan V Ghita
2018 2018 Global Information Infrastructure and Networking Symposium (GIIS)  
In this paper, we have analyzed Petya, Spyeye, VolatileCedar, PAFISH etc. through Agent-based and Agentless dynamic sandbox systems in order to investigate and benchmark their efficiency in advanced malware  ...  techniques can be easily thwarted through polymorphic, metamorphic malware, obfuscation and packing techniques, whereas in dynamic analysis malware samples are executed in a controlled environment using the sandboxing  ...  In [21] , in contrast to traditional techniques, the authors used iterative pattern mining to detect malware based on the assumption that malware do repetitive action on data sequence ranging from running  ... 
doi:10.1109/giis.2018.8635598 dblp:conf/giis/AliSPG18 fatcat:cg3s2pxcxvewzf25qfem3yylkq

Deep specification mining

Tien-Duy B. Le, David Lo
2018 Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis - ISSTA 2018  
We also demonstrate the value of DSM in sandboxing Android apps. CCS CONCEPTS • Software and its engineering → Dynamic analysis;  ...  We execute DSM to mine specifications of 11 target library classes.  ...  The results indicate it is promising to employ FSAs mined by DSM to create more effective Android sandboxes.  ... 
doi:10.1145/3213846.3213876 dblp:conf/issta/LeL18 fatcat:zml42lemanehzlkgsswrhvzl6y

Developing symbolic capacity one step at a time

Janellen Huttenlocher, Marina Vasilyeva, Nora Newcombe, Sean Duffy
2008 Cognition  
You need to make your sandbox look like mine. Your job is to take this big dot (handing the child the disc) and put it in your big sandbox so that it looks like mine''.  ...  Then the child was turned back, handed the model and told, ''See this dot in my sandbox? Remember you have to make your sandbox look like mine.  ... 
doi:10.1016/j.cognition.2006.12.006 pmid:17280658 fatcat:o4iwchxhxrb7rgmka2f75auoie

A view on the methodology of analysis and exploration of marketing data

Maciej Pondel, Jerzy Korczak
2017 Proceedings of the 2017 Federated Conference on Computer Science and Information Systems  
The paper proposes a methodology for the development of a marketing decision support system using Big Data technology and data mining techniques.  ...  The main task is to collect pre-process data to be used by the tools and data mining algorithms. In the context of Big Data technology, the data is collected in so-called data sandboxes.  ...  It should be noted that although the sandbox data is shared by data analysts and exploration modules, at the same time the sandbox platform has to ensure data security and confidentiality.  ... 
doi:10.15439/2017f442 dblp:conf/fedcsis/PondelK17 fatcat:n7txfam7qbe65bz7pvnslm3ybu

Scalable Learning Environments for Teaching Cybersecurity Hands-on [article]

Jan Vykopal, Pavel Čeleda, Pavel Seda, Valdemar Švábenský, Daniel Tovarňák
2021 arXiv   pre-print
Using the presented environments KYPO Cyber Range Platform and Cyber Sandbox Creator, we delivered the classes on-site or remotely for various target groups of learners (K-12, university students, and  ...  Index Terms-cybersecurity education, interactive learning environment, sandbox, virtual machines, cyber range, educational data mining, learning analytics, learning technology I.  ...  Moreover, the approach enables learning analytics and educational data mining of learners' interactions with the environment.  ... 
arXiv:2110.10004v1 fatcat:ctgqbjs4yfd4rbjge3pwdpeise

Anomaly Detection on Android System

Recently, the arc of digital ads has been extensively analyzed by scientists using machine learning and data mining techniques.  ...  In addition, it leverages for this function two sandboxes, the authorization sandbox and the folder sandbox.  ... 
doi:10.35940/ijitee.a4951.119119 fatcat:wodnfsaxbjctrcnwgur67ofgki

Building malware classificators usable by State security agencies

David Esteban Useche-Peláez, Daniel Orlando Díaz-López, Daniela Sepúlveda-Alzate, Diego Edison Cabuya-Padilla
2018 Iteckne  
Sandboxing has been used regularly to analyze software samples and determine if these contain suspicious properties or behaviors.  ...  This paper proposes two machine learning models able to classify samples based on signatures and permissions obtained through Cuckoo sandbox, Androguard and VirusTotal.  ...  The machine learning models can be generated from data using Weka [21] , which contains a collection of machine learning algorithms for data mining.  ... 
doi:10.15332/iteckne.v15i2.2072 fatcat:nfeiawae5vd4hpci2dufnpeb2y
« Previous Showing results 1 — 15 out of 4,345 results