The analysis of android malware behaviors

被引:0
作者
Yuhui, Fan [1 ]
Ning, Xu [1 ]
机构
[1] Department of Computer and Information Engineering, Huainan Normal University, Huainan
来源
International Journal of Security and its Applications | 2015年 / 9卷 / 03期
关键词
Android application; Decompilation; Malware; Permission; Static detection;
D O I
10.14257/ijseia.2015.9.3.26
中图分类号
学科分类号
摘要
Currently the intelligent terminal based on the Android has occupied most of the market, and the number of malware aiming at Android platform is also increasing. The problems of security threats and privacy disclosure caused by malicious behaviors are becoming more serious. How to make the security assessments and metrics effectively for the security of application has become a research hotspot in recent years. In this paper, we use static behavioral analysis approach, the thesis analyzes Android malware, summarizes its malicious behaviors and its ways of stealing private data, and puts forward the methods of detection and prevention. © 2015 SERSC.
引用
收藏
页码:335 / 346
页数:11
相关论文
共 18 条
[1]  
CNCERT/CC.CNCERT/CC Annual Report, pp. 53-56, (2013)
[2]  
Miettinen M., Halonen P., Host-based intrusion detection for advanced mobile devices, Information Networking and Applications, 20, 4, pp. 72-76, (2006)
[3]  
Enck W., Gilbert P., Chun B., Et al., TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones, (2010)
[4]  
Schmidt A.D., Smartphone malware evolution revisited: Android next target?, Proceedings of the 4th International Conference on Malicious and Unwanted Software (MALWARE), pp. 1-7, (2009)
[5]  
Schmidt A.D., Detection of Smartphone Malware, (2011)
[6]  
Bose A., Hu X., Shin K.G., Et al., Behavioral detection of malware on mobile handsets, Proceedings of the 6th international conference on Mobile systems, applications, and services, pp. 225-238, (2008)
[7]  
Fei W.F., Study on detection and protection techniques of mobile phone malicious code under the Android platform, (2012)
[8]  
Google Project Hosting, (2013)
[9]  
Enck W., Ongtang M., McDaniel P., On lightweight mobile phone application certification, Proceedings of the 16th ACM conference on Computer and communications security, pp. 235-245, (2009)
[10]  
Huan Y., Yuqing Z., Yupu H., Et al., Android malware detection method based on permission sequential pattern mining algorithm, Journal on Communications, 34, ZI, pp. 106-115, (2014)