A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware

Hayyan Hasan; Hasan Deeb; Behrouz Tork Ladani

Articles in Press, Accepted Manuscript, Available Online from 20 June 2022

http://dx.doi.org/10.22042/isecure.2022.321436.741

Abstract
  Sensitive methods are those that are commonly used by Android malware to perform malicious behavior. These methods may be either evasion or malicious payload methods. Although there are several approaches to handle these methods for performing effective dynamic malware analysis, but generally most of ...  Read More

SANT: Static Analysis of Native Threads for Security Vetting of Android Applications

Seyed Behnam Andarzian; Behrouz Tork Ladani

Volume 14, Issue 1 , January 2022, , Pages 13-25

Abstract
  Most of the current research on static analysis of Android applications for security vetting either work on Java source code or the Dalvik bytecode. Nevertheless, Android allows developers to use C or C++ code in their programs that is compiled into various binary architectures. Moreover, Java and the ...  Read More

Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware

Hayyan Hasan; Behrouz Tork Ladani; Bahman Zamani

Volume 13, Issue 2 , July 2021, , Pages 131-143

http://dx.doi.org/10.22042/isecure.2021.262208.589

Abstract
  Dynamic analysis is a prominent approach in analyzing the behavior of Android apps. To perform dynamic analysis, we need an event generator to provide proper environment for executing the app in an emulator. Monkey is the most popular event generator for Android apps in general, and is used in dynamic ...  Read More

Interdependent Security Game Design over Constrained Linear Influence Networks

Seyed Alireza Hasheminasab; Behrouz Tork Ladani; Tansu Alpcan

Volume 11, Issue 2 , July 2019, , Pages 95-111

http://dx.doi.org/10.22042/isecure.2019.186923.467

Abstract
  In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to ...  Read More

GGRA: a grouped gossip-based reputation aggregation algorithm

S. Ghasemi Falavarjani; Behrouz Tork Ladani; S. Ghasemi

Volume 7, Issue 1 , January 2015, , Pages 59-74

http://dx.doi.org/10.22042/isecure.2015.7.1.6

Abstract
  An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting ...  Read More

GTrust: a group based trust model

M. Ezhei; B. Tork Ladani

Volume 5, Issue 2 , July 2013, , Pages 155-170

http://dx.doi.org/10.22042/isecure.2014.5.2.4

Abstract
  Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this ...  Read More

A model for specification, composition and verification of access control policies and its application to web services

Z. Derakhshandeh; B. Tork Ladani

Volume 3, Issue 2 , July 2011, , Pages 103-120

http://dx.doi.org/10.22042/isecure.2015.3.2.4

Abstract
  Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access ...  Read More