Potential Component Leaks in Android Apps: An Investigation into a New Feature Set for Malware Detection

作者: Li Li , Kevin Allix , Daoyuan Li , Alexandre Bartel , Tegawende F. Bissyande

DOI: 10.1109/QRS.2015.36

关键词:

摘要: We discuss the capability of a new feature set for malware detection based on potential component leaks (PCLs). PCLs are defined as sensitive data-flows that involve Android inter-component communications. show common in apps and malicious applications indeed manipulate significantly more than benign apps. Then, we evaluate machine learning-based approach relying PCLs. Experimental validations high performance identifying malware, demonstrating can be used discriminating from

参考文章(28)
Damien Octeau, Yves Le Traon, Eric Bodden, Alexandre Bartel, Patrick McDaniel, Jacques Klein, Somesh Jha, Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis usenix security symposium. pp. 543- 558 ,(2013)
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Tao Xie, William Enck, Xusheng Xiao, Sihan Li, Benjamin Andow, Wei Yang, AppContext: differentiating malicious and benign mobile app behaviors using context international conference on software engineering. ,vol. 1, pp. 303- 313 ,(2015) , 10.5555/2818754.2818793
Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang, CHEX Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 229- 240 ,(2012) , 10.1145/2382196.2382223
Sebastien Varrette, Pascal Bouvry, Hyacinthe Cartiaux, Fotis Georgatos, Management of an academic HPC cluster: The UL experience high performance computing systems and applications. pp. 959- 967 ,(2014) , 10.1109/HPCSIM.2014.6903792
Manuel Egele, David Brumley, Yanick Fratantonio, Christopher Kruegel, An empirical study of cryptographic misuse in android applications computer and communications security. pp. 73- 84 ,(2013) , 10.1145/2508859.2516693
I Gordon Michael, Kim Deokhwan, H Perkins Jeff, Gilham Limei, Nguyen Nguyen, C Rinard Martin, None, Information-Flow Analysis of Android Applications in DroidSafe network and distributed system security symposium. ,(2015) , 10.14722/NDSS.2015.23089
Israel J. Mojica Ruiz, Meiyappan Nagappan, Bram Adams, Thorsten Berger, Steffen Dienst, Ahmed E. Hassan, Impact of Ad Libraries on Ratings of Android Mobile Apps IEEE Software. ,vol. 31, pp. 86- 92 ,(2014) , 10.1109/MS.2014.79
Kevin Allix, Quentin Jerome, Tegawende F. Bissyande, Jacques Klein, Radu State, Yves Le Traon, A Forensic Analysis of Android Malware -- How is Malware Written and How it Could Be Detected? 2014 IEEE 38th Annual Computer Software and Applications Conference. pp. 384- 393 ,(2014) , 10.1109/COMPSAC.2014.61
Fengguo Wei, Sankardas Roy, Xinming Ou, Robby, Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps computer and communications security. pp. 1329- 1341 ,(2014) , 10.1145/2660267.2660357