Automated Detection and Analysis for Android Ransomware

@article{Yang2015AutomatedDA,
  title={Automated Detection and Analysis for Android Ransomware},
  author={Tianda Yang and Yu Yang and Kai Qian and Dan Chia-Tien Lo and Ying Qian and Lixin Tao},
  journal={2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems},
  year={2015},
  pages={1338-1343}
}
  • Tianda YangYu Yang Lixin Tao
  • Published 24 August 2015
  • Computer Science
  • 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems
Along with the rapid growth of new science and technology, the functions of smartphones become more and more powerful. Nevertheless, everything has two aspects. Smartphones bring so much convenience for people and also bring the security risks at the same time. Malicious application has become a big threat to the mobile security. Thus, an efficiency security analysis and detection method is important and necessary. Due to attacking of malicious application, user could not use smartphone… 

Figures and Tables from this paper

A survey on analysis and detection of Android ransomware

This article provides a comprehensive survey on analysis and detection methods for Android ransomware since its beginning (2015) till date (2020); but also presents observations and suggestions for researchers and practitioners to carry out further research.

On the Effectiveness of Application Permissions for Android Ransomware Detection

A permissions-based ransomware detection system based on a deep analysis of android permissions was conducted to identify significant android permissions that can discriminate ransomware with high accuracy before harming users' devices.

Android Ransomware Detection Based on Dynamic Obtained Features

This paper proposed the Android ransomware detection using dynamic analysis technique and the classification algorithms Random Forest, J48, and Naive Bayes were used to classify the instances based on the proposed features.

Analysis of latest vulnerabilities in android

  • Umasankar
  • Computer Science
    2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)
  • 2017
A framework for proper security analysis of Android platform and applications to find vulnerabilities and malicious applications is created with OWASP Droid Fusion and data's collected for security analysis is from National Vulnerability Database (NVD) and OWASp Mobile Top 10.

An app based on static analysis for android ransomware

To overcome data encryption, the user is allowed to select the directories that contain important data, and as soon as new file is added to any of these directories, the file is uploaded on an online server, thus enabling the user to maintain a safe copy of all important data.

Investigating Android permissions and intents for malware detection

This thesis presents the PIndroid ― a novel Permissions and Intents based framework for identifying Android malware apps, and is the first solution that uses a combination of permissions and intents supplemented with ensemble methods for malware detection.

Ransomware Detection System for Android Applications

An application programming interface (API)-based ransomware detection system (API-RDS) was proposed to provide a static analysis paradigm for detecting Android ransomware apps and achieved 97% accuracy while reducing the complexity of the classification model by 26% due to features reduction.

A Novel Structural-Entropy-based Classification Technique for Supporting Android Ransomware Detection and Analysis

This paper presents a method based on structural entropy and fuzzy logic classification algorithms able to identify whether an application exhibits a ransomware behaviour and obtains encouraging results evaluating a dataset composed of 10,052 real-world Android applications.

Malware detection at runtime for resource-constrained mobile devices

The number of smart and connected mobile devices is increasing, bringing enormous possibilities to users in various domains and transforming everything that we get in touch with into smart. Thus, we

A detection framework for android financial malware

As attempts to thwart cybercrime have intensified, so have innovations in how cybercriminals provision their infrastructure to sustain their activities. Consequently, what motivates cybercriminals
...

References

SHOWING 1-10 OF 11 REFERENCES

DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications

A new, complementary system, called DroidMiner, which uses static analysis to automatically mine malicious program logic from known Android malware, abstracts this logic into a sequence of threat modalities, and then seeks out these threat modality patterns in other unknown (or newly published) Android apps.

SCanDroid : Automated Security Certification of Android Applications

SCANDROID’s analysis is modular to allow incremental checking of applications as they are installed on an Android device, and it expects it to be useful for automated security certification of Android applications.

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

Using TaintDroid to monitor the behavior of 30 popular third-party Android applications, this work found 68 instances of misappropriation of users' location and device identification information across 20 applications.

Secure Information Flow as a Safety Problem

The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation, and this paper generalizes the self-compositional approach with a form of information downgrading recently proposed by Li and Zdancewic.

http://www.digitaltrends.com/mobile/top-android- security-apps

  • http://www.digitaltrends.com/mobile/top-android- security-apps

/www.forbes.com/sites/gordonkelly/2014/03/24/repo rt-97-of-mobile-malware-is-on-android-this-is-the-easy- way-you-stay-safe

  • /www.forbes.com/sites/gordonkelly/2014/03/24/repo rt-97-of-mobile-malware-is-on-android-this-is-the-easy- way-you-stay-safe

/www.lookout.com/resources/reports/mobile-threat- report [4] http://securitywatch.pcmag.com/android/308966-android- s-biggest-security-threat-os-fragmentation

  • /www.lookout.com/resources/reports/mobile-threat- report [4] http://securitywatch.pcmag.com/android/308966-android- s-biggest-security-threat-os-fragmentation

Static Analysis Techniques Used in Android Application

  • Security Analysis, December
  • 2014

https://appvigil.co/blog/how-to-common-techniques-used- for-hacking-android-apps

  • https://appvigil.co/blog/how-to-common-techniques-used- for-hacking-android-apps