Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/CIS.2011.226guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Kernel-based Behavior Analysis for Android Malware Detection

Published: 03 December 2011 Publication History

Abstract

The most major threat of Android users is malware infection via Android application markets. In case of the Android Market, as security inspections are not applied for many users have uploaded applications. Therefore, malwares, e.g., Geimini and Droid Dream will attempt to leak personal information, getting root privilege, and abuse functions of the smart phone. An audit framework called log cat is implemented on the Dalvik virtual machine to monitor the application behavior. However, only the limited events are dumped, because an application developers use the log cat for debugging. The behavior monitoring framework that can audit all activities of applications is important for security inspections on the market places. In this paper, we propose a kernel-base behavior analysis for android malware inspection. The system consists of a log collector in the Linux layer and a log analysis application. The log collector records all system calls and filters events with the target application. The log analyzer matches activities with signatures described by regular expressions to detect a malicious activity. Here, signatures of information leakage are automatically generated using the smart phone IDs, e.g., phone number, SIM serial number, and Gmail accounts. We implement a prototype system and evaluate 230 applications in total. The result shows that our system can effectively detect malicious behaviors of the unknown applications.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
CIS '11: Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security
December 2011
1598 pages
ISBN:9780769545844

Publisher

IEEE Computer Society

United States

Publication History

Published: 03 December 2011

Author Tags

  1. Android
  2. malware
  3. smartphone security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networksExpert Systems with Applications: An International Journal10.1016/j.eswa.2024.123675249:PBOnline publication date: 1-Sep-2024
  • (2023)A Comprehensive Survey on Malware Detection TechniquesProceedings of the 5th International Conference on Information Management & Machine Intelligence10.1145/3647444.3647830(1-6)Online publication date: 23-Nov-2023
  • (2023)DroidEncoderComputers and Electrical Engineering10.1016/j.compeleceng.2023.108804110:COnline publication date: 1-Sep-2023
  • (2022)A Comprehensive Review of Android SecuritySecurity and Communication Networks10.1155/2022/77759172022Online publication date: 1-Jan-2022
  • (2022)CNN‐ and GAN‐based classification of malicious code familiesInternational Journal of Intelligent Systems10.1002/int.2309437:12(12472-12489)Online publication date: 25-Oct-2022
  • (2019)A novel approach for mobile malware classification and detection in Android systemsMultimedia Tools and Applications10.1007/s11042-018-6498-z78:3(3529-3552)Online publication date: 1-Jun-2019
  • (2019)Dynamic malware detection and phylogeny analysis using process miningInternational Journal of Information Security10.1007/s10207-018-0415-318:3(257-284)Online publication date: 25-May-2019
  • (2018)Towards an understanding of the impact of advertising on data leaksInternational Journal of Security and Networks10.1504/IJSN.2012.0525407:3(181-193)Online publication date: 16-Dec-2018
  • (2018)Privacy disclosure riskInternational Journal of Mobile Network Design and Innovation10.1504/IJMNDI.2013.0571475:1(2-8)Online publication date: 13-Dec-2018
  • (2018)DemadroidSecurity and Communication Networks10.1155/2018/70641312018Online publication date: 31-May-2018
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media