Automated Detection and Analysis for Android Ransomware

@article{Yang2015AutomatedDA,
  title={Automated Detection and Analysis for Android Ransomware},
  author={Tianda Yang and Yu Yang and Kai Qian and Dan Chia-Tien Lo and Ying Qian and Lixin Tao},
  journal={2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems},
  year={2015},
  pages={1338-1343}
}
  • Tianda Yang, Yu Yang, +3 authors Lixin Tao
  • Published 24 August 2015
  • Computer Science
  • 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems
Along with the rapid growth of new science and technology, the functions of smartphones become more and more powerful. Nevertheless, everything has two aspects. Smartphones bring so much convenience for people and also bring the security risks at the same time. Malicious application has become a big threat to the mobile security. Thus, an efficiency security analysis and detection method is important and necessary. Due to attacking of malicious application, user could not use smartphone… Expand
A survey on analysis and detection of Android ransomware
TLDR
This article provides a comprehensive survey on analysis and detection methods for Android ransomware since its beginning (2015) till date (2020); but also presents observations and suggestions for researchers and practitioners to carry out further research. Expand
On the Effectiveness of Application Permissions for Android Ransomware Detection
TLDR
A permissions-based ransomware detection system based on a deep analysis of android permissions was conducted to identify significant android permissions that can discriminate ransomware with high accuracy before harming users' devices. Expand
Android Ransomware Detection Based on Dynamic Obtained Features
TLDR
This paper proposed the Android ransomware detection using dynamic analysis technique and the classification algorithms Random Forest, J48, and Naive Bayes were used to classify the instances based on the proposed features. Expand
Analysis of latest vulnerabilities in android
  • Umasankar
  • Computer Science
  • 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)
  • 2017
TLDR
A framework for proper security analysis of Android platform and applications to find vulnerabilities and malicious applications is created with OWASP Droid Fusion and data's collected for security analysis is from National Vulnerability Database (NVD) and OWASp Mobile Top 10. Expand
An app based on static analysis for android ransomware
TLDR
To overcome data encryption, the user is allowed to select the directories that contain important data, and as soon as new file is added to any of these directories, the file is uploaded on an online server, thus enabling the user to maintain a safe copy of all important data. Expand
Investigating Android permissions and intents for malware detection
TLDR
This thesis presents the PIndroid ― a novel Permissions and Intents based framework for identifying Android malware apps, and is the first solution that uses a combination of permissions and intents supplemented with ensemble methods for malware detection. Expand
Ransomware Detection System for Android Applications
TLDR
An application programming interface (API)-based ransomware detection system (API-RDS) was proposed to provide a static analysis paradigm for detecting Android ransomware apps and achieved 97% accuracy while reducing the complexity of the classification model by 26% due to features reduction. Expand
An app based on static analysis for android ransomware
  • Meet Kanwal, Sanjeev Thakur
  • Computer Science
  • 2017 International Conference on Computing, Communication and Automation (ICCCA)
  • 2017
TLDR
An application that detects android ransomware in smart-phones that includes static analysis, text analysis, code analysis, and firebase database is developed. Expand
A Novel Structural-Entropy-based Classification Technique for Supporting Android Ransomware Detection and Analysis
TLDR
This paper presents a method based on structural entropy and fuzzy logic classification algorithms able to identify whether an application exhibits a ransomware behaviour and obtains encouraging results evaluating a dataset composed of 10,052 real-world Android applications. Expand
Malware detection at runtime for resource-constrained mobile devices
The number of smart and connected mobile devices is increasing, bringing enormous possibilities to users in various domains and transforming everything that we get in touch with into smart. Thus, weExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 13 REFERENCES
DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications
TLDR
A new, complementary system, called DroidMiner, which uses static analysis to automatically mine malicious program logic from known Android malware, abstracts this logic into a sequence of threat modalities, and then seeks out these threat modality patterns in other unknown (or newly published) Android apps. Expand
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
TLDR
TaintDroid is an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data and enabling realtime analysis by leveraging Android’s virtualized execution environment. Expand
SCanDroid : Automated Security Certification of Android Applications
Android is a popular mobile-device platform developed by Google. Android’s application model is designed to encourage applications to share their code and data with other applications. While suchExpand
TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones
TLDR
Using TaintDroid to monitor the behavior of 30 popular third-party Android applications, this work found 68 instances of misappropriation of users' location and device identification information across 20 applications. Expand
Secure Information Flow as a Safety Problem
TLDR
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation, and this paper generalizes the self-compositional approach with a form of information downgrading recently proposed by Li and Zdancewic. Expand
Static Analysis Techniques Used in Android Application
  • Security Analysis, December
  • 2014
Static Analysis Techniques Used in Android Application Security Analysis
  • Static Analysis Techniques Used in Android Application Security Analysis
  • 2014
/www.forbes.com/sites/gordonkelly/2014/03/24/repo rt-97-of-mobile-malware-is-on-android-this-is-the-easy- way-you-stay-safe
  • /www.forbes.com/sites/gordonkelly/2014/03/24/repo rt-97-of-mobile-malware-is-on-android-this-is-the-easy- way-you-stay-safe
/www.lookout.com/resources/reports/mobile-threat- report [4] http://securitywatch.pcmag.com/android/308966-android- s-biggest-security-threat-os-fragmentation
  • /www.lookout.com/resources/reports/mobile-threat- report [4] http://securitywatch.pcmag.com/android/308966-android- s-biggest-security-threat-os-fragmentation
...
1
2
...