• DocumentCode
    607307
  • Title

    DroidLogger: Reveal suspicious behavior of Android applications via instrumentation

  • Author

    Shuaifu Dai ; Tao Wei ; Wei Zou

  • Author_Institution
    Beijing Key Lab. of Internet Security Technol., Peking Univ., Beijing, China
  • fYear
    2012
  • fDate
    3-5 Dec. 2012
  • Firstpage
    550
  • Lastpage
    555
  • Abstract
    As the mobile devices increased rapidly in recent years, mobile malware is becoming a severe threat to users. Traditional malware detection uses signature-based methods, but these methods can be evaded by obfuscation or polymorphism. So the behavior-based detection techniques were proposed recently. To capture the apps´ behavior, previous works either use OS level tool such as strace to capture system call, or intercept high level API by modifying the virtual machine. However, the information retrieved from the former method is too difficult to understand the program´s behavior, and the technique used in latter method requires to modify the emulator, which it is not compatible when the Android version upgrade. In this paper, we proposed a new light-weight method to understand the applications´ behavior by logging program´s API and corresponding arguments. We build the logging system DroidLogger, which instruments the logging code into the application binary, and prints out the API usage information at run time. We analyzed several malware and show DroidLogger can reveal the malicious behavior effectively.
  • Keywords
    application program interfaces; information retrieval; invasive software; mobile computing; operating systems (computers); system monitoring; virtual machines; API usage information; Android applications; Android version upgrade; DroidLogger; OS level tool; applications behavior; behavior-based detection techniques; high level API; information retrieval; logging code; logging program; logging system; malicious behavior; malware detection; mobile devices; mobile malware; obfuscation; polymorphism; program behavior; signature-based methods; suspicious behavior; virtual machine; Android; Behavior; Instrumentation; Malware Detection; Suspicious API;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computing and Convergence Technology (ICCCT), 2012 7th International Conference on
  • Conference_Location
    Seoul
  • Print_ISBN
    978-1-4673-0894-6
  • Type

    conf

  • Filename
    6530396