Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2046614.2046619acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Crowdroid: behavior-based malware detection system for Android

Published: 17 October 2011 Publication History

Abstract

The sharp increase in the number of smartphones on the market, with the Android platform posed to becoming a market leader makes the need for malware analysis on this platform an urgent issue.
In this paper we capitalize on earlier approaches for dynamic analysis of application behavior as a means for detecting malware in the Android platform. The detector is embedded in a overall framework for collection of traces from an unlimited number of real users based on crowdsourcing. Our framework has been demonstrated by analyzing the data collected in the central server using two types of data sets: those from artificial malware created for test purposes, and those from real malware found in the wild. The method is shown to be an effective means of isolating the malware and alerting the users of a downloaded malware. This shows the potential for avoiding the spreading of a detected malware to a larger community.

References

[1]
50 Malware applications found on Android Official Market. http://m.guardian.co.uk/technology/blog/2011/mar/02/android-market-apps-malware?cat=technology&type=article.
[2]
Guangdong Bai, Liang Gu, Tao Feng, Yao Guo, and Xiangqun Chen. Context-aware usage control for android. In Security and Privacy in Communication Networks, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 326--343. Springer Berlin Heidelberg, 2010.
[3]
Thomas Blasing, Aubrey-Derrick Schmidt, Leonid Batyuk, Seyit A. Camtepe, and Sahin Albayrak. An android application sandbox system for suspicious software detection. In 5th International Conference on Malicious and Unwanted Software (Malware 2010) (MALWARE'2010), Nancy, France, France, 2010.
[4]
Mylookout blog. Hongtoutou. http://bit.ly/iOu5AA.
[5]
Abhijit Bose, Xin Hu, Kang G. Shin, and Taejoon Park. Behavioral detection of malware on mobile handsets. In Proceeding of the 6th international conference on Mobile systems, applications, and services, MobiSys '08, pages 225--238, New York, NY, USA, 2008. ACM.
[6]
Timothy K. Buennemeyer, Theresa M. Nelson, Lee M. Clagett, John P. Dunning, Randy C. Marchany, and Joseph G. Tront. Mobile device profiling and intrusion detection using smart batteries. In Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences, HICSS '08, pages 296--, Washington, DC, USA, 2008. IEEE Computer Society.
[7]
Cabir, Smartphone Malware. http://www.f-secure.com/ v-descs/cabir.shtml.
[8]
Cabir Malware variants. http://www.f-secure.com/weblog/archives/00000414.html.
[9]
Jerry Cheng, Starsky H.Y. Wong, Hao Yang, and Songwu Lu. Smartsiren: virus detection and alert for smartphones. In Proceedings of the 5th international conference on Mobile systems, applications and services, MobiSys '07, pages 258--271, New York, NY, USA, 2007. ACM.
[10]
Mihai Christodorescu and Somesh Jha. Static analysis of executables to detect malicious patterns. In Proceedings of the 12th conference on USENIX Security Symposium - Volume 12, pages 12--12, Berkeley, CA, USA, 2003. USENIX Association.
[11]
Mihai Christodorescu, Somesh Jha, and Christopher Kruegel. Mining specifications of malicious behavior. In Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, ESEC-FSE '07, pages 5--14, New York, NY, USA, 2007. ACM.
[12]
David Dagon, Tom Martin, and Thad Starner. Mobile phones as computing devices: The viruses are coming! IEEE Pervasive Computing, 3:11--15, October 2004.
[13]
Francesco Di Cerbo, Andrea Girardello, Florian Michahelles, and Svetlana Voronkova. Detection of malicious applications on android os. In Proceedings of the 4th international conference on Computational forensics, IWCF'10, pages 138--149, Berlin, Heidelberg, 2011. Springer-Verlag.
[14]
Manuel Egele. A survey on automated dynamic malware analysis techniques and tools. ACM Computing Surveys, to appear.
[15]
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1--6, Berkeley, CA, USA, 2010. USENIX Association.
[16]
William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. A study of android application security. In Proceedings of the 20th USENIX Security Symposium. USENIX Association, August 2011.
[17]
William Enck, Machigar Ongtang, and Patrick McDaniel. Understanding android security. IEEE Security and Privacy, 7:50--57, January 2009.
[18]
Steven A. Hofmeyr, Stephanie Forrest, and Anil Somayaji. Intrusion detection using sequences of system calls. J. Comput. Secur., 6:151--180, August 1998.
[19]
Google Inc. Android market. https://market.android.com/.
[20]
Juniper Networks Inc. Malicious mobile threats report 2010/2011. Technical report, Juniper Networks, Inc., 2011.
[21]
T. J Lee and J.J. Mody. Behavioral classification. In Proceedings of EICAR 2006, April 2006.
[22]
G A Jacoby and Nathaniel J Davis Iv. Battery-based intrusion detection. In Global Telecommunications Conference, 2004. GLOBECOM '04, pages 2250 -- 2255. IEEE, 2004.
[23]
Hahnsang Kim, Joshua Smith, and Kang G. Shin. Detecting energy-greedy anomalies and mobile malware variants. In Proceeding of the 6th international conference on Mobile systems, applications, and services, MobiSys '08, pages 239--252, New York, NY, USA, 2008. ACM.
[24]
Ramon T. Llamas, William Stofega, Stephen D. Drake, and Stacy K. Crook. Worldwide smartphone 2011--2015 forecast and analysis. Technical report, International Data Corporation, 2011.
[25]
J. B. MacQueen. Some methods for classification and analysis of multivariate observations. In L. M. Le Cam and J. Neyman, editors, Proc. of the fifth Berkeley Symposium on Mathematical Statistics and Probability, volume 1, pages 281--297. University of California Press, 1967.
[26]
Andreas Moser, Christopher Kruegel, and Engin Kirda. Limits of static analysis for malware detection. In Proceedings of the 23rd Annual Computer Security Applications Conference, ACSAC'07, pages 421--430, Los Alamitos, CA, USA, December 2007. IEEE Computer Society.
[27]
Jon Oberheide and Zach Lanier. Team joch vs android: The ultimate showdown. ShmooCon 2011, January 2011.
[28]
Machigar Ongtang, Stephen McLaughlin, William Enck, and Patrick McDaniel. Semantically rich application-centric security in android. In Proceedings of the 25th Annual Computer Security Applications Conference, ACSAC'09, pages 340--349, Los Alamitos, CA, USA, 2009. IEEE Computer Society.
[29]
Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, and Herbert Bos. Paranoid android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC'10, ACSAC '10, pages 347--356, New York, NY, USA, 2010. ACM.
[30]
Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, and Pavel Laskov. Learning and classification of malware behavior. In Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08, pages 108--125, Berlin, Heidelberg, 2008. Springer-Verlag.
[31]
Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther Schmidt, Jan Clausen, Osman Kiraz, Kamer Yüksel, Seyit Camtepe, and Albayrak Sahin. Static analysis of executables for collaborative malware detection on android. In ICC 2009 Communication and Information Systems Security Symposium, Dresden, Germany, Germany, 6 2009.
[32]
Aubrey-Derrick Schmidt, Ahmet Camtepe, and Sahin Albayrak. Static smartphone malware detection. In proceedings of the 5th Security Research Conference (Future Security 2010), ISBN: 978-3-8396-0159-4, page 146, 2010.
[33]
Aubrey-Derrick Schmidt, Jan Hendrik Clausen, Ahmet Camtepe, and Sahin Albayrak. Detecting symbian os malware through static function call analysis. In 4th International Conference on Malicious and Unwanted Software (MALWARE'09), pages 15--22. IEEE, 2009.
[34]
Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, Christian Scheel, Seyit Ahmet Camtepe, and Sahin Albayrak. Monitoring smartphones for anomaly detection. Mobile Networks and Applications (MONET) -- SPECIAL ISSUE on Mobility of Systems, Users, Data and Computing, November 2008.
[35]
Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Jan Clausen, Kamer Ali Yüksel, Osman Kiraz, Ahmet Camtepe, and Sahin Albayrak. Enhancing security of linux-based android devices. In in Proceedings of 15th International Linux Kongress. Lehmann, October 2008.
[36]
Asaf Shabtai, Yuval Fledel, Uri Kanonov, Yuval Elovici, Shlomi Dolev, and Chanan Glezer. Google android: A comprehensive security assessment. IEEE Security and Privacy, 8:35--44, 2010.
[37]
Asaf Shabtai, Uri Kanonov, and Yuval Elovici. Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. J. Syst. Softw., 83:1524--1537, August 2010.
[38]
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, and Yael Weiss. Andromaly: a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, pages 1--30, 2011. 10.1007/s10844-010-0148-x.
[39]
Asaf Shabtai, Robert Moskovitch, Yuval Elovici, and Chanan Glezer. Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Inf. Secur. Tech. Rep., 14:16--29, February 2009.
[40]
Ashkan Sharifi Shamili, Christian Bauckhage, and Tansu Alpcan. Malware detection on mobile devices using distributed machine learning. In Proceedings of the 2010 20th International Conference on Pattern Recognition, ICPR '10, pages 4348--4351, Washington, DC, USA, 2010. IEEE Computer Society.
[41]
Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, and Toshiaki Tanaka. Towards formal analysis of the permission-based security model for android. In Proceedings of the 2009 Fifth International Conference on Wireless and Mobile Communications, ICWMC '09, pages 87--92, Washington, DC, USA, 2009. IEEE Computer Society.
[42]
Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, and Toshiaki Tanaka. A formal model to analyze the permission authorization and enforcement in the android framework. In Proceedings of the 2010 IEEE Second International Conference on Social Computing, SOCIALCOM '10, pages 944--951, Washington, DC, USA, 2010. IEEE Computer Society.
[43]
Wook Shin, Sanghoon Kwak, Shinsaku Kiyomoto, Kazuhide Fukushima, and Toshiaki Tanaka. A small but non-negligible flaw in the android permission scheme. In Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY '10, pages 107--110, Washington, DC, USA, 2010. IEEE Computer Society.
[44]
Hispasec Sistemas. Virustotal malware intelligence service. http://bit.ly/mytpXt.
[45]
Symantec. Pjapps. http://bit.ly/juL7Rh.

Cited By

View all
  • (2025)Robust security risk estimation for android apps using nearest neighbor approach and hamming distanceSoft Computing10.1007/s00500-025-10489-zOnline publication date: 10-Feb-2025
  • (2024)Explainable AI for CybersecurityAdvances in Explainable AI Applications for Smart Cities10.4018/978-1-6684-6361-1.ch002(31-97)Online publication date: 18-Jan-2024
  • (2024)Implementing a hybrid Android sandbox for malware analysisDüzce Üniversitesi Bilim ve Teknoloji Dergisi10.29130/dubited.123977912:2(1114-1125)Online publication date: 29-Apr-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SPSM '11: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
October 2011
96 pages
ISBN:9781450310000
DOI:10.1145/2046614
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 October 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anomaly detection
  2. crowdsourcing
  3. data mining
  4. dynamic analysis
  5. intrusion detection
  6. malware detection
  7. smartphone security

Qualifiers

  • Research-article

Conference

CCS'11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 46 of 139 submissions, 33%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)93
  • Downloads (Last 6 weeks)3
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Robust security risk estimation for android apps using nearest neighbor approach and hamming distanceSoft Computing10.1007/s00500-025-10489-zOnline publication date: 10-Feb-2025
  • (2024)Explainable AI for CybersecurityAdvances in Explainable AI Applications for Smart Cities10.4018/978-1-6684-6361-1.ch002(31-97)Online publication date: 18-Jan-2024
  • (2024)Implementing a hybrid Android sandbox for malware analysisDüzce Üniversitesi Bilim ve Teknoloji Dergisi10.29130/dubited.123977912:2(1114-1125)Online publication date: 29-Apr-2024
  • (2024)DCEL: Classifier Fusion Model for Android Malware DetectionJournal of Systems Engineering and Electronics10.23919/JSEE.2024.00001835:1(163-177)Online publication date: Feb-2024
  • (2024)Navigating Connected Car Cybersecurity: Location Anomaly Detection with RAN Data2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring)10.1109/VTC2024-Spring62846.2024.10683076(1-6)Online publication date: 24-Jun-2024
  • (2024)Egret: Reinforcement Mechanism for Sequential Computation Offloading in Edge ComputingIEEE Transactions on Services Computing10.1109/TSC.2024.3478826(1-14)Online publication date: 2024
  • (2024)Android Malware Family Clustering Based on Multiple FeaturesIEEE Transactions on Reliability10.1109/TR.2023.333209073:2(1202-1215)Online publication date: Jun-2024
  • (2024)Improving Logic Bomb Identification in Android Apps via Context-Aware Anomaly DetectionIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.3358979(1-18)Online publication date: 2024
  • (2024)CrowdFAB: Intelligent Crowd-Forecasting Using Blockchains and its Use in SecurityIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.332203821:4(3030-3047)Online publication date: Jul-2024
  • (2024)Security issues on Forensics Applications by Dynamic Malware injection – A Review2024 8th International Conference on Electronics, Communication and Aerospace Technology (ICECA)10.1109/ICECA63461.2024.10800977(573-579)Online publication date: 6-Nov-2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media