DocumentCode
607307
Title
DroidLogger: Reveal suspicious behavior of Android applications via instrumentation
Author
Shuaifu Dai ; Tao Wei ; Wei Zou
Author_Institution
Beijing Key Lab. of Internet Security Technol., Peking Univ., Beijing, China
fYear
2012
fDate
3-5 Dec. 2012
Firstpage
550
Lastpage
555
Abstract
As the mobile devices increased rapidly in recent years, mobile malware is becoming a severe threat to users. Traditional malware detection uses signature-based methods, but these methods can be evaded by obfuscation or polymorphism. So the behavior-based detection techniques were proposed recently. To capture the apps´ behavior, previous works either use OS level tool such as strace to capture system call, or intercept high level API by modifying the virtual machine. However, the information retrieved from the former method is too difficult to understand the program´s behavior, and the technique used in latter method requires to modify the emulator, which it is not compatible when the Android version upgrade. In this paper, we proposed a new light-weight method to understand the applications´ behavior by logging program´s API and corresponding arguments. We build the logging system DroidLogger, which instruments the logging code into the application binary, and prints out the API usage information at run time. We analyzed several malware and show DroidLogger can reveal the malicious behavior effectively.
Keywords
application program interfaces; information retrieval; invasive software; mobile computing; operating systems (computers); system monitoring; virtual machines; API usage information; Android applications; Android version upgrade; DroidLogger; OS level tool; applications behavior; behavior-based detection techniques; high level API; information retrieval; logging code; logging program; logging system; malicious behavior; malware detection; mobile devices; mobile malware; obfuscation; polymorphism; program behavior; signature-based methods; suspicious behavior; virtual machine; Android; Behavior; Instrumentation; Malware Detection; Suspicious API;
fLanguage
English
Publisher
ieee
Conference_Titel
Computing and Convergence Technology (ICCCT), 2012 7th International Conference on
Conference_Location
Seoul
Print_ISBN
978-1-4673-0894-6
Type
conf
Filename
6530396
Link To Document