DocumentCode :
3594542
Title :
A detection method for malicious codes in Android apps
Author :
Jinxin Liu ; Hao Wu ; Huabin Wang
Author_Institution :
State Key Lab. of Rail Traffic Control & Safety, Beijing Jiaotong Univ., Beijing, China
fYear :
2014
Firstpage :
514
Lastpage :
519
Abstract :
In recent years, the Android operating system for mobile terminals has developed very quickly. A variety of mobile devices which are using Android operating system are more than 60% in the domestic market share. With the number of Android application raising fast, a variety of information leakage, malicious chargeback, failure of operating system events occurred frequently; the safety of Android system also attracts wide attention of researchers. In this paper, combining static analysis and dynamic analysis, we present a malicious code detection method and implementation. Through the statistics of the sensitive API functions and tracking the flow of sensitive information, static analysis module uses the static analysis reverse technology to achieve the detection of malicious behaviors. And dynamic analysis module mainly uses system log analysis and records a variety of sensitive behaviors generated during the operation to discover intrusions. Furthermore, the ultimate combination of static analysis and dynamic analysis will determine whether the target software contains malicious codes.
Keywords :
Android (operating system); application program interfaces; mobile computing; program diagnostics; security of data; API functions; Android apps; Android operating system; information leakage; malicious chargeback; malicious codes; mobile terminals; reverse technology; static analysis; Android; Dynamic Analysis; Static Analysis;
fLanguage :
English
Publisher :
iet
Conference_Titel :
Wireless Communications, Networking and Mobile Computing (WiCOM 2014), 10th International Conference on
Print_ISBN :
978-1-84919-845-5
Type :
conf
DOI :
10.1049/ic.2014.0154
Filename :
7129682
Link To Document :
بازگشت