SensDroid: Analysis for Malicious Activity Risk of Android Application

被引:13
|
作者
Shrivastava, Gulshan [1 ]
Kumar, Prabhat [1 ]
机构
[1] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna, Bihar, India
关键词
Android analysis; Data leak assessment; Intent analysis; Permission analysis; Android application clustering; Security and privacy; MALWARE; CLASSIFICATION;
D O I
10.1007/s11042-019-07899-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Android, the inter-communication structure is governed by a late runtime binding message called Intent. Intents are having rich features which can detect the true nature of malware when compared to another known trait such as permissions. In this work, a framework called SensDroid is formulated that evaluates the efficiency of android intents and permissions as a differentiating trait to spot malicious apps through sensitive analysis technique. Efficiency escalation has been achieved by integrating these traits with other well-known malware detection attributes. The proposed work also uses sufficient number of samples collected from official and third-party Android app market. Multiple parameters are evaluated and compared with the existing techniques. Successful categorization of clean and malware app with high identification rate has been achieved. As a background discussion, we also give a comprehensive review of ancient android application analysis techniques, risk identification techniques, and intent analysis techniques for contemporary malicious activity.
引用
收藏
页码:35713 / 35731
页数:19
相关论文
共 50 条
  • [1] SensDroid: Analysis for Malicious Activity Risk of Android Application
    Gulshan Shrivastava
    Prabhat Kumar
    [J]. Multimedia Tools and Applications, 2019, 78 : 35713 - 35731
  • [2] Discovering Persuaded Risk of Permission in Android Applications for Malicious Application Detection
    Singh, Pooja
    Singh, Santosh
    Tiwari, Pankaj
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 922 - 926
  • [3] Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection
    Wang, Wei
    Wang, Xing
    Feng, Dawei
    Liu, Jiqiang
    Han, Zhen
    Zhang, Xiangliang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (11) : 1869 - 1882
  • [4] Exploring the Malicious Android Applications and Reducing Risk using Static Analysis
    Kavitha, K.
    Salini, P.
    Ilamathy, V
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1316 - 1319
  • [5] Analysis of Malicious Behavior of Android Apps
    Singh, Pooja
    Tiwari, Pankaj
    Singh, Santosh
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 215 - 220
  • [6] Android Malicious Application Detection Using Permission Vector and Network Traffic Analysis
    Kandukuru, Satish
    Sharma, R. M.
    [J]. 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 1126 - 1132
  • [7] Malicious application detection in android - A systematic literature review
    Sharma, Tejpal
    Rattan, Dhavleesh
    [J]. COMPUTER SCIENCE REVIEW, 2021, 40
  • [8] Malicious Android Application Detection Based on Composite Features
    Xiao, Jingxu
    Xu, Kaiyong
    Duan, Jialiang
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2019), 2019,
  • [9] Malicious Application Detection and Classification System for Android Mobiles
    Malik, Sapna
    Khatter, Kiran
    [J]. INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2018, 9 (01) : 95 - 114
  • [10] Detecting Android application malicious behaviors based on the analysis of control flows and data flows
    Zegzhda, Peter
    Zegzhda, Dmitry
    Pavlenko, Evgeny
    Dremov, Andrew
    [J]. SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 280 - 283