An Analysis of Android Malware Behavior

被引:1
|
作者
Singh, Gagandeep [1 ]
Jaafar, Fehmi [2 ,3 ]
Zavarsky, Pavol [2 ]
机构
[1] Concordia Univ Edmonton, Dept Informat Syst, Assurance Management, Edmonton, AB, Canada
[2] Concordia Univ Edmonton, Dept Informat Syst, Secur Management, Edmonton, AB, Canada
[3] Comp Res Inst Montreal, Montreal, PQ, Canada
关键词
Android permissions; CPU usage; Android malware; traffic analysis; malformed packets;
D O I
10.1109/QRS-C.2018.00091
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Android is dominating the smartphone market with more users than any other mobile operating system. But with its growing popularity, interest from attackers has also increased, as the number of malicious applications keeps on rising. To know more about these applications, investigation of their behavior has become very important. In our paper, we present a study that combines static and dynamic analysis of these applications with an aim to analyze their behavior by examining various attributes such as permission, CPU usage, volatile memory, and traffic. The experimental result of the static analysis shows that top permissions are used by malware to access network state, Internet, write external phone state, and read phone state. Our results of runtime experiments show that CPU usage of malicious applications is on average half that of normal applications while in terms of volatile memory usage malicious applications occupied more RAM than legitimate ones. Traffic analysis includes transmission rate between endpoints which is higher in malware compared to normal applications with a higher number of malformed packets. Based on the above mentioned four attributes, the behavior of malware can be understood and this behavior can assist in differentiating malicious apps from legitimate applications.
引用
收藏
页码:505 / 512
页数:8
相关论文
共 50 条
  • [21] Benchmarking Android Malware Analysis Tools
    Higuera, Javier Bermejo
    Moreno, Javier Morales
    Higuera, Juan Ramon Bermejo
    Montalvo, Juan Antonio Sicilia
    Martillo, Gustavo Javier Barreiro
    Riera, Tomas Miguel Sureda
    [J]. ELECTRONICS, 2024, 13 (11)
  • [22] Static and Dynamic Analysis of Android Malware
    Kapratwar, Ankita
    Di Troia, Fabio
    Stamp, Mark
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 653 - 662
  • [23] An Analysis of Android Malware Classification Services
    Rashed, Mohammed
    Suarez-Tangil, Guillermo
    [J]. SENSORS, 2021, 21 (16)
  • [24] Forensic analysis of hook Android malware
    Schmutz, Dominic
    Rapp, Robin
    Fehrensen, Benjamin
    [J]. FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2024, 49
  • [25] Runtime-based Behavior Dynamic Analysis System for Android Malware Detection
    Min, Luoxu
    Cao, Qinghua
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 233 - 236
  • [26] An Exploratory Analysis in Android Malware Trends
    Hicks, Chelsea
    Dietrich, Glenn
    [J]. AMCIS 2016 PROCEEDINGS, 2016,
  • [27] DroidScribe: Classifying Android Malware Based on Runtime Behavior
    Dash, Santanu Kumar
    Suarez-Tangil, Guillermo
    Khan, Salahuddin
    Tam, Kimberly
    Ahmadi, Mansour
    Kinder, Johannes
    Cavallaro, Lorenzo
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 252 - 261
  • [28] Classifying Android Malware with Dynamic Behavior Dependency Graphs
    Lin, Zimin
    Wang, Rui
    Jia, Xiaoqi
    Zhang, Shengzhi
    Wu, ChuanKun
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 378 - 385
  • [29] A Comparative Study of Android Malware Behavior in Different Contexts
    Boileau, Catherine
    Gagnon, Francois
    Poisson, Jeremie
    Frenette, Simon
    Mejri, Mohamed
    [J]. DCNET: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 1, 2016, : 47 - 54
  • [30] DroidGraph: Discovering Android Malware by Analyzing Semantic Behavior
    Kwon, Jonghoon
    Jeong, Jihwan
    Lee, Jehyun
    Lee, Heejo
    [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 498 - 499