Corpus ID: 16226812

User-Centric Dependence Analysis For Identifying Malicious Mobile Apps

@inproceedings{Elish2012UserCentricDA,
  title={User-Centric Dependence Analysis For Identifying Malicious Mobile Apps},
  author={Karim O. Elish and Danfeng Daphne Yao and Barbara G. Ryder},
  year={2012}
}
This work has been supported in part by Security and Software Engineering Research Center (S2ERC), a NSF sponsored multi-university Industry/ University Cooperative Research Center (I/UCRC). 
User-Intention Based Program Analysis for Android Security
• Software security, malware analysis and detection, smartphone security and privacy, using program analysis and machine learning for security and privacy • Software refactoring, software qualityExpand
DroidBarrier: know what is executing on your android
TLDR
This paper proposes the use of a technique called process authentication for Android applications to overcome the shortcomings of current Android security practices and demonstrates the process authentication model for Android by designing and implementing the runtime authentication and detection system referred to as DroidBarrier. Expand
Profiling user-trigger dependence for Android malware detection
TLDR
The thesis in this mobile app classification work is to advocate the approach of benign property enforcement, i.e., extracting unique behavioral properties from benign programs and designing corresponding classification policies. Expand
SECURING MODELS FOR ANDROID MARKET PLACE
The Android platform is that the quickest growing market in smart phone operating systems thus far. As such, it has become the most viable target of security threats. The dependence of the AndroidExpand
Identifying Mobile Inter-App Communication Risks
TLDR
This work presents a flow analysis for app pairs that computes the risk level associated with their potential communications and statically analyzes the sensitivity and context of each inter-app flow based on inter-component communication (ICC) between communicating apps, and defines fine-grained security policies for inter- app ICC risk classification. Expand
MALWARE BEHAVIOURAL TESTING IN ANDROID PLATFORM
The Android platform is that the quickest growing market in smart phone operating systems being the most viable target of security threats. Most anti-malware applications within the Market use staticExpand
Mobile Guard Demo: Network Based Malware Detection
TLDR
A network based malware detection system, such as Mobile Guard, is essential in detecting malicious activities within a network, as well as protecting end users from malware attacks that are propagate through mobile operator's network. Expand
Mobile Guard Demo: Network Based Malware Detection
TLDR
A network based malware detection system, such as Mobile Guard, is essential in detecting malicious activities within a network, as well as protecting end users from malware attacks that are propagate through mobile operator's network. Expand
Android Security: A Survey of Issues, Malware Penetration, and Defenses
TLDR
This review gives an insight into the strengths and shortcomings of the known research methodologies and provides a platform, to the researchers and practitioners, toward proposing the next-generation Android security, analysis, and malware detection techniques. Expand
AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction
TLDR
This paper uses static program analysis to attribute a top level function that is usually a user interaction function with the behavior it performs, and analyzes the text extracted from the user interface component associated with the toplevel function to detect stealthy behavior. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 21 REFERENCES
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
TLDR
TaintDroid is an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data and enabling realtime analysis by leveraging Android’s virtualized execution environment. Expand
A Study of Android Application Security
TLDR
A horizontal study of popular free Android applications uncovered pervasive use/misuse of personal/ phone identifiers, and deep penetration of advertising and analytics networks, but did not find evidence of malware or exploitable vulnerabilities in the studied applications. Expand
Panorama: capturing system-wide information flow for malware detection and analysis
TLDR
This work proposes a system, Panorama, to detect and analyze malware by capturing malicious information access and processing behavior, which separates these malicious applications from benign software. Expand
Location based power analysis to detect malicious code in smartphones
TLDR
There is potential for detecting the presence of malicious code in smartphone by detecting abnormalities in location-based power consumption by exploiting correlation between a user's location and power consumption pattern of his/her smartphone. Expand
Static Analysis of Executables to Detect Malicious Patterns
TLDR
An architecture for detecting malicious patterns in executables that is resilient to common obfuscation transformations is presented, and experimental results demonstrate the efficacy of the prototype tool, SAFE (a static analyzer for executables). Expand
On lightweight mobile phone application certification
TLDR
The Kirin security service for Android is proposed, which performs lightweight certification of applications to mitigate malware at install time and indicates that security configuration bundled with Android applications provides practical means of detecting malware. Expand
VirusMeter: Preventing Your Cellphone from Spies
TLDR
VirusMeter is proposed, a novel and general malware detection method, to detect anomalous behaviors on mobile devices and can effectively detect these malware activities with less than 1.5% additional power consumption in real time. Expand
Android permissions demystified
TLDR
Stowaway, a tool that detects overprivilege in compiled Android applications, is built and finds that about one-third of applications are overprivileged. Expand
DATA-PROVENANCE VERIFICATION FOR SECURE HOSTS
TLDR
A cryptographic provenance verification approach for ensuring system properties and system-data integrity at kernel-level and a malware detection approach based on the characteristic behaviors of human users are proposed. Expand
Intrusion detection via static analysis
TLDR
It is shown how static analysis may be used to automatically derive a model of application behavior and the result is a host-based intrusion detection system with three advantages: a high degree of automation, protection against a broad class of attacks based on corrupted code, and the elimination of false alarms. Expand
...
1
2
3
...