An integrated static detection and analysis framework for android

作者: Jun Song , Chunling Han , Kaixin Wang , Jian Zhao , Rajiv Ranjan

DOI: 10.1016/J.PMCJ.2016.03.003

关键词:

摘要: Abstract The security and privacy issues of android system have attracted a lot attention from both industry academia in recent years. Static detection is one typical method to analyze malicious code. However, existing single static can introduce high false alarm rate only appropriate for limited scope. In this paper, we propose an integrated framework, which consists four layers filtering mechanisms, that is, the message digest (MD5) values, combination permissions, dangerous intention, respectively. An intuitive threat-degree model proposed especially on permissions detection. Furthermore, implement prototype ASE validate its feasibility, performance scalability. A comprehensive evaluation shows framework has obvious advantages efficiency, granularity, layers, correctness.

参考文章(23)
Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, Gonzalo Álvarez, PUMA: Permission Usage to Detect Malware in Android CISIS/ICEUTE/SOCO Special Sessions. pp. 289- 298 ,(2013) , 10.1007/978-3-642-33018-6_30
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, Andromaly: a behavioral malware detection framework for android devices intelligent information systems. ,vol. 38, pp. 161- 190 ,(2012) , 10.1007/S10844-010-0148-X
Silvio Cesare, Yang Xiang, Wanlei Zhou, Control Flow-Based Malware VariantDetection IEEE Transactions on Dependable and Secure Computing. ,vol. 11, pp. 307- 317 ,(2014) , 10.1109/TDSC.2013.40
Wei Yu, Hanlin Zhang, Linqiang Ge, Rommie Hardy, None, On behavior-based detection of malware on Android platform global communications conference. pp. 814- 819 ,(2013) , 10.1109/GLOCOM.2013.6831173
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning, Detecting repackaged smartphone applications in third-party android marketplaces Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12. pp. 317- 326 ,(2012) , 10.1145/2133601.2133640
Y. Wang, S. Wen, S. Cesare, W. Zhou, Y. Xiang, The Microcosmic Model of Worm Propagation The Computer Journal. ,vol. 54, pp. 1700- 1720 ,(2011) , 10.1093/COMJNL/BXR082
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, Crowdroid Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 15- 26 ,(2011) , 10.1145/2046614.2046619
Thomas Bläsing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Camtepe, Sahin Albayrak, An Android Application Sandbox system for suspicious software detection international conference on malicious and unwanted software. pp. 55- 62 ,(2010) , 10.1109/MALWARE.2010.5665792
Naser Peiravian, Xingquan Zhu, Machine Learning for Android Malware Detection Using Permission and API Calls international conference on tools with artificial intelligence. pp. 300- 305 ,(2013) , 10.1109/ICTAI.2013.53