Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

AndroidProtect: Android Apps Security Analysis System

  • Conference paper
  • First Online:
Collaborate Computing: Networking, Applications and Worksharing (CollaborateCom 2016)

Abstract

Android Apps market is the largest in the world. There are some features about Android Apps: massive, diverse, uncertain behaviors and permissions. That makes detecting malicious Apps very difficult. In this paper, a two layers model based on static analysis and dynamic analysis is proposed to solve it. We name the model AndroidProtect. We can use AndroidProtect to calculate feature value of massive Apps, monitor behavior of target Apps. The first layer identifies the dangerous Apps, The second layer analyzes their behavior. The experimental results show that in the case of similar static feature value, the dynamic analysis can fix deviation, and we can get more accurate assessment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mobile Security Situation Android system in the first half 2014, 22 July 2014. http://m.qq.com/security_lab/news_detail_259.html

  2. App Stores Growth Accelerates in 2014, 13 January 2015. http://blog.appfigures.com/app-stores-growth-accelerates-in-2014

  3. Safe market, 31 May 2016. http://zhushou.360.cn/

  4. Android Open Source Project, 31 May 2016. https://source.android.com/

  5. Manifest.permission, 31 May 2016. https://developer.android.com/reference/android/Manifest.permission.html

  6. Zeng, S.: Research on investigation of privacy protection in android operating system based on Static analysis. University of Science and Technology of China (2014)

    Google Scholar 

  7. Qin, Z., Wang, Z., Wu, F., et al.: Android malware detection based on multi-level signature matching. Appl. Res. Comput. 33(3), 891–895 (2016)

    Google Scholar 

  8. Peng, G., Li, J., Sun, R., et al.: Android malware detection research and development. J. Wuhan Univ. (Nat. Sci. Ed.) 61(1), 21–33 (2015)

    Google Scholar 

  9. Wang, H., Li, T., Zhang, T., Wang, J.: Android apps security evaluation system in the cloud. In: Guo, S., Liao, X., Liu, F., Zhu, Y. (eds.) CollaborateCom 2015. LNICSSITE, vol. 163, pp. 151–160. Springer, Cham (2016). doi:10.1007/978-3-319-28910-6_14

    Chapter  Google Scholar 

Download references

Acknowledgement

Authors are partially supported by Colleges and Universities in Hubei Provincial College Students’ Innovative Entrepreneurial Training Program (No. 201510488006).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tong Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Zhang, T., Li, T., Wang, H., Xiao, Z. (2017). AndroidProtect: Android Apps Security Analysis System. In: Wang, S., Zhou, A. (eds) Collaborate Computing: Networking, Applications and Worksharing. CollaborateCom 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 201. Springer, Cham. https://doi.org/10.1007/978-3-319-59288-6_58

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59288-6_58

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59287-9

  • Online ISBN: 978-3-319-59288-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics