Detection of malicious applications on Android OS

作者: Francesco Di Cerbo , Andrea Girardello , Florian Michahelles , Svetlana Voronkova

DOI: 10.1007/978-3-642-19376-7_12

关键词: Computer securityComputer security modelMobile device forensicsAndroid (operating system)Mobile operating systemComputer scienceMalware

摘要: The paper presents a methodology for mobile forensics analysis, to detect "malicious" (or "malware") applications, i.e., those that deceive users hiding some of their functionalities. This is specifically targeted the Android operating system, and relies on its security model features, namely set permissions exposed by each application. has been trained more than 13,000 applications hosted Market, collected with AppAware. A case study presented as preliminary validation methodology.

参考文章(9)
Florian Michahelles, Andrea Girardello, Explicit and Implicit Ratings for Mobile Applications Informatik 2010. Service science - Neue Perspektiven für Informatik. Band 1. pp. 606- 612 ,(2010)
Toon Calders, Sebastián Ventura, Cristóbal Romero, Enrique García, Drawbacks and solutions of applying association rule mining in learning management systems CEUR-WS.org. ,(2008)
Keonwoo Kim, Dowon Hong, Jae-Cheol Ryou, Kyoil Chung, Data Acquisition from Cell Phone using Logical Approach World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering. ,vol. 1, pp. 1105- 1108 ,(2007)
Raffaele Perego, Salvatore Orlando, P. Palmerini, Enhancing the Apriori Algorithm for Frequent Set Counting data warehousing and knowledge discovery. ,vol. 2114, pp. 71- 82 ,(2001) , 10.1007/3-540-44801-2_8
Brian D. Carrier, Risks of live digital forensic analysis Communications of the ACM. ,vol. 49, pp. 56- 61 ,(2006) , 10.1145/1113034.1113069
Raimund Moser, Witold Pedrycz, Giancarlo Succi, A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction international conference on software engineering. pp. 181- 190 ,(2008) , 10.1145/1368088.1368114
Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, Ian H. Witten, The WEKA data mining software ACM SIGKDD Explorations Newsletter. ,vol. 11, pp. 10- 18 ,(2009) , 10.1145/1656274.1656278
W Jansen, R P Ayers, Guidelines on Cell Phone Forensics National Institute of Standards and Technology. ,(2007) , 10.6028/NIST.SP.800-101
David G. Stork, Richard O. Duda, Peter E. Hart, Pattern Classification ,(1973)