DocumentCode
237352
Title
A Forensic Analysis of Android Malware -- How is Malware Written and How it Could Be Detected?
Author
Allix, Kevin ; Jerome, Quentin ; Bissyande, Tegawende F. ; Klein, John ; State, Radu ; Le Traon, Yves
Author_Institution
Interdiscipl. Centre for Security, Reliability & Trust, Univ. of Luxembourg Luxembourg, Luxembourg, Luxembourg
fYear
2014
fDate
21-25 July 2014
Firstpage
384
Lastpage
393
Abstract
We consider in this paper the analysis of a large set of malware and benign applications from the Android ecosystem. Although a large body of research work has dealt with Android malware over the last years, none has addressed it from a forensic point of view. After collecting over 500,000 applications from user markets and research repositories, we perform an analysis that yields precious insights on the writing process of Android malware. This study also explores some strange artifacts in the datasets, and the divergent capabilities of state-of-the-art antivirus to recognize/define malware. We further highlight some major weak usage and misunderstanding of Android security by the criminal community and show some patterns in their operational flow. Finally, using insights from this analysis, we build a naive malware detection scheme that could complement existing anti virus software.
Keywords
Android (operating system); digital forensics; invasive software; Android ecosystem; Android malware; Android security; antivirus software; criminal community; forensic analysis; malware detection; operational flow patterns; writing process; Androids; Bioinformatics; Genomics; Google; Humanoid robots; Malware; Software; Android Security; Digital Forensics; Malware Analysis; Malware development;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Software and Applications Conference (COMPSAC), 2014 IEEE 38th Annual
Conference_Location
Vasteras
Type
conf
DOI
10.1109/COMPSAC.2014.61
Filename
6899240
Link To Document