Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets

@inproceedings{Zhou2012HeyYG,
  title={Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets},
  author={Yajin Zhou and Zhi Wang and Wu Zhou and Xuxian Jiang},
  booktitle={NDSS},
  year={2012}
}
In this paper, we present a systematic study for the detection of malicious applications (or apps) on popular Android Markets. To this end, we first propose a permissionbased behavioral footprinting scheme to detect new samples of known Android malware families. Then we apply a heuristics-based filtering scheme to identify certain inherent behaviors of unknown malicious families. We implemented both schemes in a system called DroidRanger. The experiments with 204, 040 apps collected from five… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 497 CITATIONS

Android Application Security

  • SpringerBriefs in Computer Science
  • 2016
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

PMDS: Permission-Based Malware Detection System

VIEW 6 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Examining Application Components to Reveal Android Malware

VIEW 9 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Towards Privacy-Preserving Malware Detection Systems for Android

Helei Cui, Yajin Zhou, Cong Wang, Qi Li, Kui Ren
  • 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)
  • 2018
VIEW 11 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Identifying Unknown Android Malware with Feature Extractions and Classification Techniques

  • 2015 IEEE Trustcom/BigDataSE/ISPA
  • 2015
VIEW 7 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Securing Android: A Survey, Taxonomy, and Challenges

VIEW 11 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Securing mobile devices: malware mitigation methods

VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Permission-combination-based scheme for Android mobile malware detection

  • 2014 IEEE International Conference on Communications (ICC)
  • 2014
VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2010
2019

CITATION STATISTICS

  • 48 Highly Influenced Citations

  • Averaged 46 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 31 REFERENCES

A Study of Android Application Security

VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Android permissions demystified

  • ACM Conference on Computer and Communications Security
  • 2011
VIEW 1 EXCERPT