Detecting Malware with Similarity to Android applications

被引:0
|
作者
Park, Wonjoo [1 ]
Kim, Sun-joong [1 ]
Ryu, Won [1 ]
机构
[1] ETRI, Intelligent Convergence Media Res Dept, Daejeon, South Korea
关键词
Android malware; malware analysis; Smartphone security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In light of the rapid growth of smartphones, there are unrelenting malicious attacks on smartphones from voice phishing to mobile malwares. Especially, SMiShing malicious application has become a crucial threat on smartphone since it can be easily rampant via URLs embedded in SMS messages and emails. SMiShing attack installs the malicious application, it has been exploited by financial fraud and leak of private information stored on the smartphone. Our solution intercepts and gathers the malicious application and analyzing it instead of smartphone. It can block installing malicious application on smartphone and also analyze fast and accurately. Also, a number of malicious applications targeting Android operation system are similar to known malware and repackaged an existed malicious application. It presents a unique feature that the downloaded applications can be compared with accumulated malwares. In this paper, we propose the detection system for android malicious application using static analysis along with malicious feature similarity.
引用
收藏
页码:1249 / 1251
页数:3
相关论文
共 50 条
  • [31] Control dependency analyses for detecting remote control Android malware
    Li, J. (lijingzhe@ruc.edu.cn), 1600, Tsinghua University (54):
  • [32] Mining nested flow of dominant APIs for detecting android malware
    Alam, Shahid
    Alharbi, Soltan Abed
    Yildirim, Serdar
    COMPUTER NETWORKS, 2020, 167 (167)
  • [33] Mining Dominance Tree of API Calls for Detecting Android Malware
    Alam, Shahid
    Yildirim, Serdar
    Hassan, Mahamat
    Sogukpinar, Ibrahim
    2018 2ND INTERNATIONAL SYMPOSIUM ON MULTIDISCIPLINARY STUDIES AND INNOVATIVE TECHNOLOGIES (ISMSIT), 2018, : 192 - 195
  • [34] Detecting Android Malware Leveraging Text Semantics of Network Flows
    Wang, Shanshan
    Yan, Qiben
    Chen, Zhenxiang
    Yang, Bo
    Zhao, Chuan
    Conti, Mauro
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) : 1096 - 1109
  • [35] FLSH: A Framework Leveraging Similarity Hashing for Android Malware and Variant Detection
    Hadi, Hassan Jalil
    Khalid, Alina
    Hussain, Faisal Bashir
    Ahmad, Naveed
    Alshara, Mohammed Ali
    IEEE ACCESS, 2025, 13 : 26142 - 26156
  • [36] Appearance Similarity Evaluation for Android Applications
    Zhu, Jiawei
    Wu, Zhengang
    Guan, Zhi
    Chen, Zhong
    2015 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI), 2015, : 323 - 328
  • [37] Explainable Machine Learning for Malware Detection on Android Applications
    Palma, Catarina
    Ferreira, Artur
    Figueiredo, Mario
    INFORMATION, 2024, 15 (01)
  • [38] A review of cloned mobile malware applications for android devices
    Baykara, Muhammet
    Colak, Eren
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 394 - 398
  • [39] ScanSavant: Malware Detection for Android Applications with Explainable AI
    Navaneethan, S.
    Udhaya Kumar, S.
    International Journal of Interactive Mobile Technologies, 2024, 18 (19) : 171 - 181
  • [40] Multilevel Permission Extraction in Android Applications for Malware Detection
    Wang, Zhen
    Li, Kai
    Hu, Yan
    Fukuda, Akira
    Kong, Weiqiang
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 221 - 225