Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection

被引:105
|
作者
Chen, Jing [1 ,2 ]
Wang, Chiheng [1 ]
Zhao, Ziming [3 ]
Chen, Kai [4 ,5 ]
Du, Ruiying [6 ]
Ahn, Gail-Joon [7 ,8 ]
机构
[1] Wuhan Univ, Comp Sch, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan 430072, Hubei, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu 610041, Sichuan, Peoples R China
[3] Arizona State Univ, Sch Comp Informat & Decis Syst Engn, Tempe, AZ 85287 USA
[4] Chinese Acad Sci, Inst Informat Engn, SKLOIS, Beijing 100049, Peoples R China
[5] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100190, Peoples R China
[6] Collaborat Innovat Ctr Geospatial Technol, Wuhan 430079, Peoples R China
[7] Arizona State Univ, Tempe, AZ 85287 USA
[8] Samsung Res, Seoul, South Korea
基金
中国国家自然科学基金;
关键词
Ransomware; Android; real-time detection; user interface (UI) indicator;
D O I
10.1109/TIFS.2017.2787905
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, we witnessed a drastic increase of ransomware, especially on popular mobile platforms including Android. Ransomware extorts victims for a sum of money by taking control of their devices or files. In light of their rapid growth, there is a pressing need to develop effective countermeasure solutions. However, the research community is still constrained by the lack of a comprehensive data set, and there exists no insightful understanding of mobile ransomware in the wild. In this paper, we focus on the Android platform and aim to characterize existing Android ransomware. Specifically, we have managed to collect 2,721 ransomware samples that cover the majority of existing Android ransomware families. Based on these samples, we systematically characterize them from several aspects, including timeline and malicious features. In addition, the detection results of existing anti-virus tools are rather disappointing, which clearly calls for customized anti-mobile-ransomware solutions. To detect ransomware that extorts users by encrypting data, we propose a novel real-time detection system, called RansomProber. By analyzing the user interface widgets of related activities and the coordinates of users' finger movements, RansomProber can infer whether the file encryption operations are initiated by users. The experimental results show that RansomProber can effectively detect encrypting ransomware with high accuracy and acceptable runtime performance.
引用
收藏
页码:1286 / 1300
页数:15
相关论文
共 50 条
  • [31] Real-time face detection and tracking for mobile videoconferencing
    Paschalakis, S
    Bober, M
    REAL-TIME IMAGING, 2004, 10 (02) : 81 - 94
  • [32] Real-time human face detection in color image
    He, X
    Liu, ZM
    Zhou, JL
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 2915 - 2920
  • [33] Face detection in a real-time videostream on Raspberry Pi
    Podestat, Jaroslav
    Kropik, Petr
    Benes, Jan
    22TH INTERNATIONAL CONFERENCE COMPUTATIONAL PROBLEMS OF ELECTRICAL ENGINEERING (CPEE 2021), 2021,
  • [34] Real-Time Face Detection Using a Moving Camera
    Huang, Deng-Yuan
    Chen, Chao-Ho
    Chen, Tsong-Yi
    Wu, Jian-He
    Ko, Chien-Chuan
    2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 609 - 614
  • [35] Real-time Face Detection Algorithm Using GPU
    Feng, Zhongyuan
    Jia, Jinyuan
    Zhao, Feipeng
    2011 IEEE 12TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, VOLS 1 AND 2: NEW ENGINES FOR INDUSTRIAL DESIGN: INTELLIGENCE - INTERACTION - SERVICES, 2011, : 1284 - 1289
  • [36] Real-Time Face Detection/Identification for Surveillance System
    Suvonvorn, Nikom
    Chocksuriwong, Anant
    ICED: 2008 INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN, VOLS 1 AND 2, 2008, : 752 - 756
  • [37] Real-Time Face Detection Using AdaBoot Algorithm
    Han, Cheol Hun
    Sim, Kwee-Bo
    2008 INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS, VOLS 1-4, 2008, : 1603 - 1606
  • [38] Real-time multi-view face detection
    Zhang, ZQ
    Zhu, L
    Li, SZ
    Zhang, HJ
    FIFTH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION, PROCEEDINGS, 2002, : 149 - 154
  • [39] Real-time implementation of face detection for a ubiquitous computing
    Kim, JO
    Kim, JS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 1, 2005, 3480 : 1187 - 1195
  • [40] Automated Detection and Analysis for Android Ransomware
    Yang, Tianda
    Yang, Yu
    Qian, Kai
    Lo, Dan Chia-Tien
    Qian, Ying
    Tao, Lixin
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1338 - 1343