Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2016, Article ID 8034967, 17 pages
http://dx.doi.org/10.1155/2016/8034967
Research Article

Detection and Visualization of Android Malware Behavior

1Electronics and Computing Department, Mondragon University, 20500 Mondragon, Spain
2National University of Engineering (UNI), P.O. Box 5595, Managua, Nicaragua
3ExoClick SL, 08005 Barcelona, Spain
4Department of Computer and Information Science, Linköping University, 581 83 Linköping, Sweden

Received 7 November 2015; Accepted 7 February 2016

Academic Editor: Aniket Mahanti

Copyright © 2016 Oscar Somarriba et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Gartner, “Gartner says worldwide traditional PC, tablet, ultramobile and mobile phone shipments on pace to grow 7.6 percent in 2014,” October 2015, http://www.gartner.com/newsroom/id/2645115.
  2. G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and J. Blasco, “Dendroid: a text mining approach to analyzing and classifying code structures in Android malware families,” Expert Systems with Applications, vol. 41, no. 4, pp. 1104–1117, 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. Y. Zhang, M. Yang, B. Xu et al., “Vetting undesirable behaviors in android apps with permission use analysis,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS '13), pp. 611–622, ACM, Berlin, Germany, November 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. Microsoft, “Web services,” 2014, http://msdn.microsoft.com/en-us/library/ms950421.aspx.
  5. R. T. Fielding, Architectural styles and the design of network-based software architectures [Ph.D. thesis], University of California, Irvine, Calif, USA, 2000.
  6. Sufatrio, D. J. J. Tan, T.-W. Chua, and V. L. L. Thing, “Securing android: a survey, taxonomy, and challenges,” ACM Computing Surveys, vol. 47, no. 4, article 58, 2015. View at Publisher · View at Google Scholar
  7. P. Faruki, A. Bharmal, V. Laxmi et al., “Android security: a survey of issues, malware penetration, and defenses,” IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 998–1022, 2015. View at Publisher · View at Google Scholar
  8. Android.com, “Android system permissions,” 2014, http://developer.android.com/guide/topics/security/permissions.html.
  9. R. Winsniewski, “Android-apktool: a tool for reverse engineering android apk files,” 2012.
  10. M. Karami, M. Elsabagh, P. Najafiborazjani, and A. Stavrou, “Behavioral analysis of android applications using automated instrumentation,” in Proceedings of the 7th International Conference on Software Security and Reliability (SERE-C '13), pp. 182–187, Gaithersburg, Md, USA, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi, “Xmandroid: a new android evolution to mitigate privilege escalation attacks,” Tech. Rep. TR-2011-04, Technische Universität Darmstadt, Darmstadt, Germany, 2011. View at Google Scholar
  12. K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie, “PScout: analyzing the Android permission specification,” in Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS '12), pp. 217–228, ACM, Raleigh, NC, USA, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Jeon, K. K. Micinski, J. A. Vaughan et al., “Dr. android and Mr. hide: fine-grained permissions in android applications,” in Proceedings of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12), pp. 3–14, ACM, Raleigh, NC, USA, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, “Crowdroid: behaviorbased malware detection system for android,” in Proceedings of the 1st ACM Workshop on Security And Privacy in Smartphones and Mobile Devices, pp. 15–26, ACM, 2011.
  15. K. Patel and B. Buddhadev, “Predictive rule discovery for network intrusion detection,” in Intelligent Distributed Computing, vol. 321 of Advances in Intelligent Systems and Computing, pp. 287–298, Springer, Basel, Switzerland, 2015. View at Publisher · View at Google Scholar
  16. X. Jiang and Y. Zhou, Android Malware, Springer, New York, NY, USA, 2013.
  17. H. Gascon, F. Yamaguchi, D. Arp, and K. Rieck, “Structural detection of android malware using embedded call graphs,” in Proceedings of the ACM Workshop on Artificial Intelligence and Security, pp. 45–54, ACM, 2013.
  18. D. Arp, M. Spreitzenbarth, M. Hübner, H. Gascon, K. Rieck, and C. Siemens, “Drebin: effective and explainable detection of android malware in your pocket,” in Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS '14), San Diego, Calif, USA, February 2014.
  19. A. Shabtai, L. Tenenboim-Chekina, D. Mimran, L. Rokach, B. Shapira, and Y. Elovici, “Mobile malware detection through analysis of deviations in application network behavior,” Computers & Security, vol. 43, pp. 1–18, 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. M. La Polla, F. Martinelli, and D. Sgandurra, “A survey on security for mobile devices,” IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 446–471, 2013. View at Publisher · View at Google Scholar · View at Scopus
  21. G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and A. Ribagorda, “Evolution, detection and analysis of malware for smart devices,” IEEE Communications Surveys & Tutorials, vol. 16, no. 2, pp. 961–987, 2014. View at Publisher · View at Google Scholar · View at Scopus
  22. S. Arzt, S. Rasthofer, and E. Bodden, “Instrumenting android and java applications as easy as abc,” in Runtime Verification, pp. 364–381, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  23. S.-H. Seo, A. Gupta, A. M. Sallam, E. Bertino, and K. Yim, “Detecting mobile malware threats to homeland security through static analysis,” Journal of Network and Computer Applications, vol. 38, no. 1, pp. 43–53, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. K. Patel and B. Buddadev, “Detection and mitigation of android malware through hybrid approach,” in Security in Computing and Communications, vol. 536 of Communications in Computer and Information Science, pp. 455–463, Springer, Basel, Switzerland, 2015. View at Publisher · View at Google Scholar