AndroPIn: Correlating Android permissions and intents for malware detection

作者: Fauzia Idrees , Muttukrishnan Rajarajan , Thomas M Chen , Yogachandran Rahulamathavan , Ayesha Naureen

DOI: 10.1109/IEMCON.2017.8117152

关键词: Computer scienceMarket leaderFeature extractionAndroid (operating system)Computer securityMobile telephonyResource constrainedCovertMalware

摘要: Smartphone» have become a prime target for cyber criminals. Android being the market leader is major of malicious attackers. Covert techniques used by malware make them hard to detect with signature based methods. In this paper, we present AndroPIn — novel detection tool using Permissions and Intents. The proposed framework overcomes limitation stealthy exploiting usage pattern permissions intents. These features, which play role in sharing user data device resources cannot be obfuscated or altered. vital features are well suited resource constrained smartphones. Experimental evaluation on corpus real-world benign apps demonstrate that algorithm can effectively low runtime overheads resilient common obfuscations

参考文章(22)
Martina Lindorfer, Matthias Neugschwandtner, Christian Platzer, None, MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis computer software and applications conference. ,vol. 2, pp. 422- 433 ,(2015) , 10.1109/COMPSAC.2015.103
Fauzia Idrees, Muttukrishnan Rajarajan, Investigating the android intents and permissions for malware detection wireless and mobile computing, networking and communications. pp. 354- 358 ,(2014) , 10.1109/WIMOB.2014.6962194
Yuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, X. Sean Wang, Binyu Zang, Vetting undesirable behaviors in android apps with permission use analysis computer and communications security. pp. 611- 622 ,(2013) , 10.1145/2508859.2516689
David Barrera, H. G üne ş Kayacik, Paul C. van Oorschot, Anil Somayaji, A methodology for empirical analysis of permission-based security models and its application to android Proceedings of the 17th ACM conference on Computer and communications security - CCS '10. pp. 73- 84 ,(2010) , 10.1145/1866307.1866317
Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang, CHEX Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 229- 240 ,(2012) , 10.1145/2382196.2382223
Erika Chin, Adrienne Porter Felt, Kate Greenwood, David Wagner, Analyzing inter-application communication in Android Proceedings of the 9th international conference on Mobile systems, applications, and services - MobiSys '11. pp. 239- 252 ,(2011) , 10.1145/1999995.2000018
Fauzia Idrees, Rajarajan Muttukrishnan, War against Mobile Malware with Cloud Computing and Machine Learning forces ieee international conference on cloud networking. pp. 278- 280 ,(2014) , 10.1109/CLOUDNET.2014.6969008
William Enck, Machigar Ongtang, Patrick McDaniel, On lightweight mobile phone application certification computer and communications security. pp. 235- 245 ,(2009) , 10.1145/1653662.1653691
Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, Kuo-Ping Wu, DroidMat: Android Malware Detection through Manifest and API Calls Tracing information security. pp. 62- 69 ,(2012) , 10.1109/ASIAJCIS.2012.18
Timothy Vidas, Nicolas Christin, Evading android runtime analysis via sandbox detection computer and communications security. pp. 447- 458 ,(2014) , 10.1145/2590296.2590325