Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles

Preprint English OPEN
Jang, Jae-wook; Yun, Jaesung; Mohaisen, Aziz; Woo, Jiyoung; Kim, Huy Kang;
(2016)
  • Subject: Computer Science - Cryptography and Security

Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices. Accordingly, techniques have been introduced for identifying, classifying, and defending against mobile threats utilizing static, d... View more
  • References (43)
    43 references, page 1 of 5

    [1] Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., and Siemens, C. Drebin: E ective and explainable detection of android malware in your pocket. In Proceedings of the 21th Annual Network and Distributed System Security Symposium (NDSS '14) (2014).

    [2] Bayer, U., Comparetti, P., Hlauschek, C., Kruegel, C., and Kirda, E. Scalable, behavior-based malware clustering. In Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS '09) (2009).

    [3] Blasing, T., Batyuk, L., Schmidt, A.-D., Camtepe, S., and Albayrak, S. An Android Application Sandbox system for suspicious software detection. In Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on (2010), pp. 55{62.

    [4] Bose, A., Hu, X., Shin, K. G., and Park, T. Behavioral Detection of Malware on Mobile Handsets. In Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (2008), MobiSys '08, pp. 225{238.

    [5] Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R., and Shastry, B. Towards taming privilege-escalation attacks on Android. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (2012).

    [6] Burguera, I., Zurutuza, U., and Nadjm-Tehrani, S. Crowdroid: Behavior-based Malware Detection System for Android. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (2011), SPSM '11, pp. 15{26.

    [7] Contagio. Contagio mobile-mobile malware mini dump. http://contagiominidump.blogspot.kr/, 2011. Accessed Oct. 28, 2015.

    [8] Droidbox. Droidbox - Android Application Sandbox - Google Project Hosting. https://code.google.com/archive/p/droidbox/, 2011. Accessed Oct. 28, 2015.

    [9] Enck, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J., McDaniel, P., and Sheth, A. N. TaintDroid: An Information- ow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (2010), OSDI'10, pp. 1{6.

    [10] Enck, W., Ongtang, M., and McDaniel, P. On Lightweight Mobile Phone Application Certi cation. In Proceedings of the 16th ACM Conference on Computer and Communications Security (2009), CCS '09, pp. 235{245.

  • Related Research Results (1)
  • Related Organizations (2)
  • Metrics
Share - Bookmark