A hybrid approach of mobile malware detection in Android

Journal of Parallel and Distributed Computing - Tập 103 - Trang 22-31 - 2017
Fei Tong1, Zheng Yan2,1
1State Key Laboratory on Integrated Services Networks, School of Cyber Engineering, Xidian University, China
2Department of Communications and Networking, Aalto University, Espoo, Finland

Tóm tắt

Từ khóa


Tài liệu tham khảo

D. Barrera, H.G. Kayacik, P.C. Van Oorschot, A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to Android, in: Proc. of 17th ACM Conf. Computer and Communications Security, CCS 10, 2010, pp. 73–84.

T. Blasing, L. Batyuk, A. Schmidt, S.A. Camtepe, S. Albayrak, An android application sandbox system for suspicious software detection, in: Malicious and Unwanted Software (MALWARE), 2010, pp. 55–62.

Das, 2016, Semantics-based online malware detection: towards efficient real-time protection against malware, IEEE Trans. Inf. Forensics Secur., 11, 289, 10.1109/TIFS.2015.2491300

B. Dixon, S. Mishra, Power based malicious code detection techniques for smartphone, in: 013 Twelfth IEEE International Conference on Trust, Security and Privacy in Conmputing and Communications, 2013,. pp. 142–149.

M. Egele, PiOS: Detecting privacy leaks in iOS applications. in: Network and Distributed System Security Symposium, 2011. www.iseclab.org/papers/egele-ndss11.pdf.

M. Egele, T. Scholte, E. Kirda, C. Kruegel, A survey on automated dynamic malware analysis techniques and tools, 2012. https://www.seclab.tuwien.ac.at/papers/malware_survey.pdf.

Enck, 2014, TaintDroid: an information-flow tracking system for real-time privacy monitoring on smartphones, ACM Trans. Comput. Syst., 32, 10.1145/2619091

W. Enck, D. Octeau, P. Mcdaniel, A Study of Android application security, 2011. http://static.usenix.org/events/sec11/tech/full_papers/Enck.pdf.

W. Enck, M. Ongtang, P. Mcdaniel, On lightweight mobile phone application certification, in: Proc. of 16th ACM Conf. Computer and Communications Security, CCS 09, 2009, pp. 235–245.

A.P. Felt, K. Greenwood, D. Wagner, The effectiveness of application permissions, 2011. http://cn.bing.com/academic/profile?id=1489067988&v=paper_preview&mkt=zh-cn.

H. Jie, Z. Genbao, Research transplanting method of embedded linux kernel based on ARM platform, in:Information Science and Management Engineering (ISME), 2010, pp. 25–38.

H. Kim, M. Choi, Linux kernel-based feature selection for Android malware detection, in: Network Operations and Management Symposium (APNOMS), 2014, pp. 1–4.

Q. Li, X. Li, Android malware detection based on static analysis of characteristic tree, in: Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2015, pp. -84-91.

J. Li, L. Zhai, X. Zhang, D. Quan, Research of android malware detection based on network traffic monitoring, in: Industrial Electronics and Applications (ICIEA), 2014, pp. 1739–1744.

Memon, 2015, Colluding apps: tomorrow’s mobile malware threat, IEEE Secur. Priv., 13, 77, 10.1109/MSP.2015.143

S. Moghaddam, M. Abbaspour, Maghsood Abbaspour, Sensitivity analysis of static features for Android malware detection, in: Electrical Engineering (ICEE), 2014, pp. 920–924.

D. Quan, L. Zhai, F. Yang, P. Wang, Detction of android malicious apps based on the sensitive behaviors, in: 2014 Thirteenth IEEE International Conference on Trust, Security and Privacy in Conmputing and Communications, 2014, pp. 877–1883.

L. Sayfullina, E. Eirola, D. Komashinsky, P. Palumbo, Y. Miche, A. Lendasse, J. Karhunen, Efficient detection of zero-day Android malware using normalized bernoulli naive bayes, in: 2015 IEEE Trustcom/BigDataSE/ISPA, 2015, pp. 198–205.

A. Schmidt, J. Clausen, A. Camtepe, Detecting Symbian OS Malware through Static Function Call Analysis, in: Proc. 4th Int’l Conf. Malicious and Unwanted Software, Malware 09, 2009, pp. 15–22.

T. Shen, Y. Zhongyang, Z. Xin, B. Mao, H. Huang, Detect android malware variants using component based topology graph, in: 2014 IEEE Thirteenth International Conference on Trust, Security and Privacy in computing and Communications, 2014, pp. 406–413.

Suarez-Tangil, 2014, Evolution, detection and analysis of malware for smart devices, IEEE Commun. Surv. Tutor., 16, 961, 10.1109/SURV.2013.101613.00077

Thomas, 2010, An Android application sandbox system for suspicious software detection, 55

Wang, 2014, Exploring permission-induced risk in Android applications for malicious application detection, IEEE Trans. Inf. Forensics Secur., 9, 1869, 10.1109/TIFS.2014.2353996

B. Wang, B. Wang, Q. Xiong, The comparison of communication methods between user and Kernel space in embedded Linux, in: Computational Problem-Solving (ICCP), 2010, pp. 234–237.

D. Wu, C. Mao, T. Wei, H. Lee, K. Wu, Droidmat: Android malware detection through manifest and api calls tracing, in: Information Security, Asia JCIS, 2012, pp. 62–69.

Yerima, 2014, Analysis of Bayesian classification-based approaches for Android malware detection, IET Information Security, 8, 25, 10.1049/iet-ifs.2013.0095

X. Zhao, D. Tian, The architecture design of streaming media applications for Android OS, in: Software Engineering and Service Science (ICSESS), 2012, pp. 280–283.

M. Zheng, M. Sun, J.C. Lui, DroidTrace: a ptrace based Android dynamic analysis system with forward execution capability, in: Wireless Communications and Mobile Computing Conference (IWCMC), 2014, pp. 128–133.

Y. Zhou, X. Jiang, Dissecting Android malware: characterization and evolution, in: 2012 IEEE Symposium in Security and Privacy, IEEE S&P, 2012, pp. 95–109.