Detection of Malicious Applications on Android OS

被引:0
|
作者
Di Cerbo, Francesco [1 ]
Girardello, Andrea [2 ]
Michahelles, Florian [2 ]
Voronkova, Svetlana [1 ]
机构
[1] Free Univ Bolzano Bozen, Ctr Appl Software Engn, Bolzano, Italy
[2] ETH, Informat Management, Zurich, Switzerland
来源
COMPUTATIONAL FORENSICS | 2011年 / 6540卷
关键词
Mobile Forensics; Android OS; Security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper presents a methodology for mobile forensics analysis, to detect "malicious" (or "malware") applications, i.e., those that deceive users hiding some of their functionalities. This methodology is specifically targeted for the Android mobile operating system, and relies on its security model features, namely the set of permissions exposed by each application. The methodology has been trained on more than 13,000 applications hosted on the Android Market, collected with AppAware. A case study is presented as a preliminary validation of the methodology.
引用
收藏
页码:138 / +
页数:3
相关论文
共 50 条
  • [31] Network-based detection of Android malicious apps
    Garg, Shree
    Peddoju, Sateesh K.
    Sarje, Anil K.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (04) : 385 - 400
  • [32] Detection of Android Malicious Apps Based on the Sensitive Behaviors
    Quan, Daiyong
    Zhai, Lidong
    Yang, Fan
    Wang, Peng
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 877 - 883
  • [33] On the use of artificial malicious patterns for android malware detection
    Jerbi, Manel
    Dagdia, Zaineb Chelly
    Bechikh, Slim
    Ben Said, Lamjed
    COMPUTERS & SECURITY, 2020, 92 (92)
  • [34] Malicious code detection for Android using Instruction Signatures
    Hu Ge
    Li Ting
    Dong Hang
    Yu Hewei
    Zhang Miao
    2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 332 - 337
  • [35] MysteryChecker: Unpredictable Attestation to Detect Repackaged Malicious Applications in Android
    Jeong, Jihwan
    Seo, Dongwon
    Lee, Chanyoung
    Kwon, Jonghoon
    Lee, Heejo
    Milburn, John
    PROCEEDINGS OF THE 2014 9TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE: THE AMERICAS (MALWARE), 2014, : 50 - 57
  • [36] DroidEcho: an in-depth dissection of malicious behaviors in Android applications
    Meng, Guozhu
    Feng, Ruitao
    Bai, Guangdong
    Chen, Kai
    Liu, Yang
    CYBERSECURITY, 2018, 1 (01)
  • [37] SteaelErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications
    Casolare, Rosangela
    Ciaramella, Giovanni
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [38] Using Opcode-Sequences to Detect Malicious Android Applications
    Jerome, Quentin
    Allix, Kevin
    State, Radu
    Engel, Thomas
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 914 - 919
  • [39] Contrasting Permission Patterns between Clean and Malicious Android Applications
    Moonsamy, Veelasha
    Rong, Jia
    Liu, Shaowu
    Li, Gang
    Batten, Lynn
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 69 - 85
  • [40] Automatically Detecting Malicious Sensitive Data Usage in Android Applications
    Yan, Hongbing
    Xiong, Yan
    Huang, Wenchao
    Huang, Jianmeng
    Meng, Zhaoyi
    2018 4TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2018), 2018, : 102 - 107