Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2656434.2656448acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
abstract

Analysis of mobile malware based on user awareness

Published: 13 October 2014 Publication History

Abstract

The number of mobile device malware has been increasing drastically last several years. When attempting to detect malware within a device, it is difficult to draw a clear line between malicious and normal activities. Even useful applications naturally result in data transfer from a mobile device to a remote server and a malware detection mechanism based solely on information flow might consider this as data leakage. Therefore one should also consider the surrounding context of an application to make a better decision on whether it is malicious or not. In this current research, a dynamic analysis approach is taken which monitors and measures the runtime behavior and logs from the mobile application. In particular, a concept of user awareness (UA) is proposed which represents a degree of intent with which an application tries to hide its activities from a user. This extended analysis measurement, combined with dataflow-based analysis, will help make a more accurate decision with less false positives.

References

[1]
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. 2010. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. USENIX OSDI, 1--6.
[2]
C. Xiang, F. Binxing, Y. Lihua, L. Xiaoyi, and Z. Tianning. 2011. Andbot: Towards Advanced Mobile Botnets. USENIX Conference on Large-scale Exploits and Emergent Threats.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
RIIT '14: Proceedings of the 3rd annual conference on Research in information technology
October 2014
98 pages
ISBN:9781450327114
DOI:10.1145/2656434
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 October 2014

Check for updates

Author Tags

  1. emulation
  2. malware analysis
  3. mobile
  4. user awareness

Qualifiers

  • Abstract

Funding Sources

Conference

SIGITE/RIIT'14
Sponsor:
SIGITE/RIIT'14: SIGITE/RIIT 2014
October 15 - 18, 2014
Georgia, Atlanta, USA

Acceptance Rates

RIIT '14 Paper Acceptance Rate 14 of 39 submissions, 36%;
Overall Acceptance Rate 51 of 116 submissions, 44%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 176
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media