SYSTEM SIGNALS MONITORING AND PROCESSING FOR COLLUDED APPLICATION ATTACKS DETECTION IN ANDROID OS

被引:0
作者
Khokhlov, Igor [1 ]
Perez, Michael [1 ]
Reznik, Leon [1 ]
机构
[1] Rochester Inst Technol, Rochester, NY 14623 USA
来源
2019 IEEE WESTERN NEW YORK IMAGE AND SIGNAL PROCESSING WORKSHOP (WNYISPW) | 2019年
基金
美国国家科学基金会;
关键词
Attack detection; Android system monitoring; neural networks;
D O I
10.1109/wnyipw.2019.8923113
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper investigates a novel colluded application attack's influence on the system's technological signals of an Android OS smartphone. This attack requires two or more applications to collaborate in order to bypass permission restriction mechanisms and leak private data. We implement this attack on a real stock Android OS smartphone and record such technological signals as overall memory consumption, CPU utilization, and CPU frequency. These recordings are studied in order to investigate the feasibility of their employment in building the attack classifiers. In developing those classifiers, we employed various machine learning techniques processing these technological signals. Such machine learning techniques as a feed-forward and long-short term memory neural networks were investigated and compared against each other. The results achieved are presented and analyzed.
引用
收藏
页数:5
相关论文
共 17 条
  • [1] [Anonymous], 2017, IDC SMARTPHONE OS MA
  • [2] [Anonymous], 2019, MALWARE STAT TRENDS
  • [3] [Anonymous], 2016, Mcafee labs threats report
  • [4] [Anonymous], 2018, APP STORE APPLE
  • [5] Burguera I., 2011, P 1 ACM WORKSH SEC P, P15, DOI DOI 10.1145/2046614.2046619
  • [6] Cimpanu Catalin., 2015, 100 million android users may have a backdoor on their device thanks to the baidu sdk
  • [7] Cimpanu Catalin, 2016, 21 ANDROID APPS SPOT
  • [8] Davi L, 2011, LECT NOTES COMPUT SC, V6531, P346
  • [9] Hu Xue Li, 2018, J WIRELESS COMMUNICA, V2018, P148
  • [10] McCormick Rich, 2014, HACK LEAKS 100S NUDE