Instance-based Anomaly Method for Android Malware Detection

被引:0
作者
Sanz, Borja [1 ]
Santos, Igor [1 ]
Ugarte-Pedrero, Xabier [1 ]
Laorden, Carlos [1 ]
Nieves, Javier [1 ]
Bringas, Pablo G. [1 ]
机构
[1] Univ Deusto, S3Lab, Ave Univ 24, Bilbao, Spain
来源
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013) | 2013年
关键词
Security; Malware; Android;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The usage of mobile phones has increased in our lives because they offer nearly the same functionality as a personal computer. Besides, the number of applications available for Android-based mobile devices has increased. Android application distribution is based on a centralized market where the developers can upload and sell their applications. However, as it happens with any popular service, it is prone to misuse and, in particular, malware writers can use this market to upload their malicious creations. In this paper, we propose a new method that, based upon several features that are extracted from the AndroidManifest file of the legitimate applications, builds an anomaly detection system able to detect malware.
引用
收藏
页码:387 / 394
页数:8
相关论文
共 13 条
[1]  
[Anonymous], J INTELLIGENT INFORM
[2]  
[Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
[3]  
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
[4]  
Egele M., 2011, PIOS DETECTING PRIVA
[5]  
Mylonas A., 2012, DELEGATE SMARTPHONE
[6]  
Peng H., 2012, P 2012 ACM C COMPUTE, P241
[7]  
Rastogi V., 2013, EVALUATING ANDROID A
[8]  
Schmidt A.-D., 2010, P 5 SEC RES C FUT SE, P978
[9]  
Shabtai A., 2010, Proceedings 2010 International Conference on Computational Intelligence and Security (CIS 2010), P329, DOI 10.1109/CIS.2010.77
[10]  
Shabtai A., 2010, MOBILE WIRELESS MIDD, P235, DOI DOI 10.1007/978-3-642-17758-3_17