Research Article

Behavior Intention Derivation of Android Malware Using Ontology Inference

Table 6

Malware samples and their behavior information.

Sample familyNumberOurs (Copper)Major behaviorIntention classification

Zitmo16 monitor, intercept, access, connect, encrypt, transmitPrivacy stealing
GoldDream19 monitor, access, store, connect, transmitPrivacy stealing
DroidDream15 right_gain, access, connect, transmitPrivacy stealing
DroidDeluxe13 monitor, right_gain, access, connect, transmitPrivacy stealing
HippoSMS14 send, monitor, access, interceptTariff consumption
Geinimi16 remote_control, send, connect, transmitTariff consumption
RogueSPPush16 send, monitor, access, intercept, deleteMalicious chargeback
GGTracker19 access, connect, transmit, store, encrypt, monitor, send, interceptMalicious chargeback
DroidKungFu-Update14 connect, transmit, install_mal, popupMalware propagation
Love buckle word14 popup, tamper, connect, transmit, right_gainExtortion user
Aliasing12 access, sendPrivacy leak
AndroidSpecific93 access, logging, sendPrivacy leak
ArraysAndLists72 access, sendPrivacy leak
Callbacks42 access, sendPrivacy leak
EmulatorDetection33 access, logging, sendPrivacy leak
FieldAndObjectSensitivity33 access, logging, sendPrivacy leak
GeneralJava143 access, logging, sendPrivacy leak
ImplicitFlows42 access, loggingPrivacy leak
InterAppCommunication32 access, sendPrivacy leak
Lifecycle114 access, connect, send, loggingPrivacy leak
Reflection42 access, sendPrivacy leak
Threading23 access, logging, sendPrivacy leak