Android malware detection based on power consumption analysis

被引:0
|
作者
机构
[1] Yang, Hong-Yu
[2] Tang, Rui-Wen
来源
| 1600年 / Univ. of Electronic Science and Technology of China卷 / 45期
关键词
Android (operating system) - Android malware - Application programs - Gaussian distribution - Mobile security - Mobile telecommunication systems - Speech recognition;
D O I
10.3969/j.issn.1001-0548.2016.06.018
中图分类号
学科分类号
摘要
This paper proposes a malicious software detection method based on power consumption. Firstly, the mobile terminal's power consumption status is obtained, and the Gaussian mixture model (GMM) is built by using Mel frequency cepstral coefficients (MFCC). Then the GMM is used to analyze power consumption, and then identify malicious applications through the application software classification processing. Experiments show that an application software function and its power consumption have a close relationship, and some malicious applications in mobile terminals can be detected accurately through analyzing software power consumption information. © 2016, Editorial Board of Journal of the University of Electronic Science and Technology of China. All right reserved.
引用
收藏
相关论文
共 50 条
  • [1] Power Consumption Based Android Malware Detection
    Yang, Hongyu
    Tang, Ruiwen
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016
  • [2] Malware Detection in Android based on Dynamic Analysis
    Bhatia, Taniya
    Kaushal, Rishabh
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [3] Category Based Malware Detection for Android
    Grampurohit, Vijayendra
    Kumar, Vijay
    Rawat, Sanjay
    Rawat, Shatrunjay
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 239 - 249
  • [4] Android malware detection based on static behavior feature analysis
    Chen, Chen
    Liu, Yun
    Shen, Bo
    Cheng, Jun-Jun
    [J]. Journal of Computers (Taiwan), 2018, 29 (06) : 243 - 253
  • [5] Attack Tree Based Android Malware Detection with Hybrid Analysis
    Zhao, Shuai
    Li, Xiaohong
    Xu, Guangquan
    Zhang, Lei
    Feng, Zhiyong
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 380 - 387
  • [6] IntDroid: Android Malware Detection Based on API Intimacy Analysis
    Zou, Deqing
    Wu, Yueming
    Yang, Siru
    Chauhan, Anki
    Yang, Wei
    Zhong, Jiangying
    Dou, Shihan
    Jin, Hai
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021, 30 (03)
  • [7] Android Malware Detection Based on Static Analysis of Characteristic Tree
    Li, Qi
    Li, Xiaoyu
    [J]. 2015 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, 2015, : 84 - 91
  • [8] An Android Malware Detection System Based on Behavior Comparison Analysis
    Tao, Jing
    Zhang, Yan
    Cao, Pengfei
    Wang, Zheng
    Zhao, Qiqi
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 387 - 396
  • [9] AndroDFA: Android malware classification based on resource consumption
    Massarelli, Luca
    Aniello, Leonardo
    Ciccotelli, Claudio
    Querzoni, Leonardo
    Ucci, Daniele
    Baldoni, Roberto
    [J]. Information (Switzerland), 2020, 11 (06):
  • [10] AndroDFA: Android Malware Classification Based on Resource Consumption
    Massarelli, Luca
    Aniello, Leonardo
    Ciccotelli, Claudio
    Querzoni, Leonardo
    Ucci, Daniele
    Baldoni, Roberto
    [J]. INFORMATION, 2020, 11 (06)