SherlockDroid: a research assistant to spot unknown malware in Android marketplaces

作者: Axelle Apvrille , Ludovic Apvrille

DOI: 10.1007/S11416-015-0245-Z

关键词:

摘要: With over 1,400,000 Android applications in Google Play alone, and dozens of different marketplaces, malware unfortunately have no difficulty to sneak silently spread. Known their variants are nowadays quite well detected by anti-virus scanners. Nevertheless, the fundamentally new unknown remain an issue. To assist research teams discovery such malware, we built infrastructure, named SherlockDroid, whose goal is filter out mass only keep those which most likely be malicious for future inspection Anti-virus teams. SherlockDroid consists marketplace crawlers, code-level property extractors a classification tool Alligator decides whether sample looks or not, based on some prior learning. In our tests, extracted properties classified 480K applications. During two crawling campaigns July 2014 October 2014, crawled 120K with detection one Android/Odpa.A!tr.spy, riskware. previous findings, this increases Alligator’s “Hall Shame” 8 potentially unwanted

参考文章(27)
Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra, MADAM: A Multi-level Anomaly Detector for Android Malware Lecture Notes in Computer Science. pp. 240- 253 ,(2012) , 10.1007/978-3-642-33704-8_21
Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis, AndRadar: Fast Discovery of Android Applications in Alternative Markets international conference on detection of intrusions and malware, and vulnerability assessment. pp. 51- 71 ,(2014) , 10.1007/978-3-319-08509-8_4
Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, Gonzalo Álvarez, PUMA: Permission Usage to Detect Malware in Android CISIS/ICEUTE/SOCO Special Sessions. pp. 289- 298 ,(2013) , 10.1007/978-3-642-33018-6_30
Martina Lindorfer, Clemens Kolbitsch, Paolo Milani Comparetti, Detecting Environment-Sensitive Malware Lecture Notes in Computer Science. pp. 338- 357 ,(2011) , 10.1007/978-3-642-23644-0_18
Adam Pridgen, Dan S. Wallach, Theodore Book, Longitudinal Analysis of Android Ad Library Permissions arXiv: Cryptography and Security. ,(2013)
Joseph Migga Kizza, Computer Network Security ,(2005)
Fred Cohen, Computer viruses Computers & Security. ,vol. 6, pp. 22- 35 ,(1987) , 10.1016/0167-4048(87)90122-2
Neslihan Kose, Ludovic Apvrille, Jean-Luc Dugelay, Facial makeup detection technique based on texture and shape analysis ieee international conference on automatic face gesture recognition. ,vol. 1, pp. 1- 7 ,(2015) , 10.1109/FG.2015.7163104
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971