Dynalog: an automated dynamic analysis framework for characterizing android applications

作者:

DOI: 10.1109/CYBERSECPODS.2016.7502337

关键词:

摘要: Android is becoming ubiquitous and currently has the largest share of mobile OS market with billions application downloads from official app market. It also become platform most targeted by malware that are more sophisticated to evade state-of-the-art detection approaches. Many families employ obfuscation techniques in order avoid this may defeat static analysis based Dynamic on other hand be used overcome limitation. Hence paper we propose DynaLog, a dynamic framework for characterizing applications. The provides capability analyse behaviour applications an extensive number features. automated mass characterization apps useful quickly identifying isolating malicious DynaLog leverages existing open source tools extract log high level behaviours, API calls, critical events can explore characteristics application, thus providing extensible detecting malware. evaluated using real samples clean demonstrating its capabilities effective

参考文章(15)
Clint Gibler, Jonathan Crussell, Jeremy Erickson, Hao Chen, AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale trust and trustworthy computing. pp. 291- 307 ,(2012) , 10.1007/978-3-642-30921-2_17
Suleiman Y. Yerima, Sakir Sezer, Igor Muttik, Android malware detection: An eigenspace analysis approach science and information conference. pp. 1236- 1242 ,(2015) , 10.1109/SAI.2015.7237302
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, Andromaly: a behavioral malware detection framework for android devices intelligent information systems. ,vol. 38, pp. 161- 190 ,(2012) , 10.1007/S10844-010-0148-X
Markus Zeilinger, Michael Rodler, Dieter Vymazal, Thomas Eder, ANANAS - A Framework for Analyzing Android Applications availability, reliability and security. pp. 711- 719 ,(2013) , 10.1109/ARES.2013.93
Suleiman Y. Yerima, Gavin McWilliams, Sakir Sezer, Analysis of Bayesian classification-based approaches for Android malware detection Iet Information Security. ,vol. 8, pp. 25- 36 ,(2014) , 10.1049/IET-IFS.2013.0095
S. Y. Yerima, S. Sezer, G. McWilliams, I. Muttik, A New Android Malware Detection Approach Using Bayesian Classification advanced information networking and applications. pp. 121- 128 ,(2013) , 10.1109/AINA.2013.88
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, Crowdroid Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 15- 26 ,(2011) , 10.1145/2046614.2046619
Erika Chin, Adrienne Porter Felt, Kate Greenwood, David Wagner, Analyzing inter-application communication in Android Proceedings of the 9th international conference on Mobile systems, applications, and services - MobiSys '11. pp. 239- 252 ,(2011) , 10.1145/1999995.2000018
Axelle Apvrille, Tim Strazzere, Reducing the window of opportunity for Android malware Gotta catch 'em all Journal of Computer Virology and Hacking Techniques. ,vol. 8, pp. 61- 71 ,(2012) , 10.1007/S11416-012-0162-3
Wen-Chieh Wu, Shih-Hao Hung, DroidDolphin: a dynamic Android malware detection framework using big data and machine learning research in adaptive and convergent systems. pp. 247- 252 ,(2014) , 10.1145/2663761.2664223