Professional Documents
Culture Documents
4, APRIL 2012
715
I. INTRODUCTION
Recently, with the development of mobile computing
ability and high-speed mobile communication network of
technology advances, smartphones are now becoming
increasingly popular and cheaper, their kinds and users
have increased so greatly in the past few years. These
smartphones offer new computing environment, due to
the openness of its operating system, the net-work is ease
of use that make it more vulnerable to malicious attacks
and information thefts, also brought new challenges for
their security researchers.
As more and more personal information are stored in
smartphones, including digital images, personal address
book, personal documents et al., it is easier to connect to
the other terminal and may types of network, terminal
software can access the network without permission of its
owner, the user privacy of information leak out by
running this kinds of software. Meanwhile, Malware may
also be without the authorization of owner to "hide" some
of the high payment services and power-exhausted servi 2012 ACADEMY PUBLISHER
doi:10.4304/jnw.7.4.715-722
716
717
718
H = { f | f ( x) =
wi( x )
w W }
|| w ||
(1)
(4)
Vi = Vi {w W | + ( wi ( xi + 1)) > 0}
(5)
So Vi and Vi
719
RR = ncsi RFncsi
(6)
i =1
NormalAsMal
100%
TotalDetected
MalAsNormal
FNR =
100%
TotalDetected
FPR =
(7)
(8)
720
Malware
type
TABLE II.
MALWARE DETECTION EVALUATION RESULT
Infected
Correct
False
False
num
detected positive negative
Detection
rate
Geinimi
30
28
3.7%
3%
93.3%
DroidDream
30
27
5.4%
4.6%
90%
Plankton
30
27
4.3%
5.7%
90%
721
722
[21].
[22].
[23].
[24].
[25].