{"id":1817,"date":"2015-08-06T21:23:53","date_gmt":"2015-08-06T19:23:53","guid":{"rendered":"http:\/\/sseblog.ec-spride.de\/?p=1817"},"modified":"2015-08-06T21:23:53","modified_gmt":"2015-08-06T19:23:53","slug":"bsc-malware-eval","status":"publish","type":"post","link":"https:\/\/blogs.uni-paderborn.de\/sse\/2015\/08\/06\/bsc-malware-eval\/","title":{"rendered":"[Bachelor-Thesis] Evaluating the Effectiveness of Android Malware Detection Approaches"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_1817 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_1817')){$('.twoclick_social_bookmarks_post_1817').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blogs.uni-paderborn.de\\\/sse\\\/2015\\\/08\\\/06\\\/bsc-malware-eval\\\/\",\"post_id\":1817,\"post_title_referrer_track\":\"%5BBachelor-Thesis%5D+Evaluating+the+Effectiveness+of+Android+Malware+Detection+Approaches\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p>We are looking for an interested student who wants to write her\/his bachelor-thesis at the Secure Software Engineering Group about Android Security.<\/p>\n<p><em><strong>Title: Evaluating the Effectiveness of Android Malware Detection Approaches<\/strong><\/em><\/p>\n<p><!--more--><\/p>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Android is the world\u2019s most popular mobile platform hosting various applications for almost every need in different app stores. This makes Android applications a valuable target for attackers. Indeed, there are many different Android malware families that try to financially harm the victim. This is applied by different techniques, such as sending premium-messages or stealing banking credentials. Since the wish of malware authors is to remain undiscovered as long as possible, different obfuscation techniques are applied that makes it very hard to automatically detect malicious applications.<\/p>\n<p>At the same time, many thousand applications get uploaded to app stores or sent to Anti-Virus companies every day, all of which need to be analyzed for malicious behavior. A manual analysis process is infeasible, fostering the need for precise and efficient automatic malware detection approaches. Researchers have developed many different techniques, such as machine-learning approaches or behavior analysis, to try to automatically argue about the maliciousness of an application, but an important question is how to evaluate those approaches. A representative evaluation requires experiments on realistic malware samples.<\/p>\n<p>The task of the student is to (1) create a benchmark-suite with state-of-the-art malware samples including obfuscated or packed malware (2) evaluate different existing detection approaches on that benchmark-suite (3) develop proposals for possible improvements in the detection approaches.<\/p>\n<h2>Requirements:<\/h2>\n<p>Knowledge about Android is required (implementation of own Android apps would be beneficial), as is the interest in Android security. Reverse engineering skills, especially in the context of Android applications are beneficial.<\/p>\n<p>Thesis can be written in german or english.<\/p>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Are you interested? Please contact\u2028\u00a0Siegfried Rasthofer at siegfried.rasthofer@cased.de \/ +49 6151 16-75425<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>We are looking for an interested student who wants to write her\/his bachelor-thesis at the Secure Software Engineering Group about Android Security. Title: Evaluating the Effectiveness of Android Malware Detection Approaches<\/p>\n","protected":false},"author":6581,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,1,51],"tags":[],"class_list":["post-1817","post","type-post","status-publish","format-standard","hentry","category-android","category-general","category-security-analysis"],"_links":{"self":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/posts\/1817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/users\/6581"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/comments?post=1817"}],"version-history":[{"count":0,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/posts\/1817\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/media?parent=1817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/categories?post=1817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/tags?post=1817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}