In recent years, the ubiquity of mobile devices has witnessed a concomitant surge in malware attacks, with Android platforms emerging as predominant targets. The inherent open-source architecture of the Android operating system inadvertently paves the way for the proliferation of malevolent applications. Conventional malware detection methodologies, which predominantly hinge on manual feature extraction and juxtaposition against feature repositories, are notably resource-draining. Furthermore, an over-reliance on singular features often obfuscates the demarcation between benign and malevolent applications. To address this lacuna, this study propounds an innovative Android malicious code detection paradigm, amalgamating multifarious features with the prowess of deep learning. By decompiling APK (Android application package), we extract three static features: Opcode (operation code), API (application program interface) call, and Permission (permission). We use the N-Gram method to process the operation code to improve the extraction efficiency, filter out effective permissions to improve the classification accuracy, and select APIs related to permissions to increase the logic between features. After encoding, we input them into DNN for classification. Experiments on a dataset containing 8008 applications show that using multi-features and deep learning networks can significantly improve the accuracy of malware detection, verifying the superiority of this method in detecting malicious code.
Autonomous vehicles are the core of future smart transportation, and Tesla is a leader in the field. As vehicles become intelligent, cyber attack defense becomes a concern. Tesla autonomous vehicles may be challenged by Stuxnet-style malware, whose self-replication and propagation capabilities may threaten transportation security. This study proposes a spatiotemporal mathematical model for such malware. Based on computer virus propagation dynamics, it is combined with Tesla Autonomous vehicles for the first time. The propagation characteristics of the malware are analyzed, and scientific recommendations are provided for future prevention.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.