Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2018 (2018), Article ID 1649703, 12 pages
https://doi.org/10.1155/2018/1649703
Research Article

Detecting Android Malwares with High-Efficient Hybrid Analyzing Methods

1School of Electronic Information Engineering, Tianjin University, Tianjin 30072, China
2Teachers College of Columbia University, New York, NY 10027, USA

Correspondence should be addressed to Xiangdong Huang; nc.ude.ujt@gnauhdx

Received 30 July 2017; Revised 8 October 2017; Accepted 29 October 2017; Published 13 March 2018

Academic Editor: Xiapu Luo

Copyright © 2018 Yu Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. http://www.idc.com/prodserv/4Pillars/mobility#Press.
  2. https://www.magzter.com/news/488/1242/052017/0jt0j.
  3. “Kaspersky: forget lone hackers, mobile malware is serious business,” February 2014.
  4. A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, “A survey of mobile malware in the wild,” in Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 3–14, Swissôtel Chicago, Chicago, IL, USA, October 2011.
  5. F. Di Cerbo, A. Girardello, F. Michahelles, and S. Voronkova, “Detection of malicious applications on Android OS,” in Proceedings of the 4th International Workshop on Computational Forensics (IWCF), pp. 138–149, Springer, Berlin, Heidelberg, Germany, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. P. Faruki, A. Bharmal, V. Laxmi et al., “Android security: a survey of issues, malware penetration, and defenses,” IEEE Communications Surveys and Tutorials, vol. 17, no. 2, pp. 998–1022, 2015. View at Publisher · View at Google Scholar · View at Scopus
  7. A. Sadeghi, H. Bagheri, J. Garcia, and S. Malek, “A taxonomy and qualitative comparison of program analysis techniques for security assessment of Android software,” IEEE Transactions on Software Engineering, vol. 43, no. 6, pp. 492–530, 2017. View at Publisher · View at Google Scholar · View at Scopus
  8. W. Wang, X. Wang, D. Feng, J. Liu, Z. Han, and X. Zhang, “Exploring permission-induced risk in Android applications for malicious application detection,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1869–1882, 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. P. P. Chan and W. K. Song, “Static detection of Android malware by using permissions and API calls,” in Proceedings of Security and Privacy in Communication Networks. SecureComm 2013, vol. 1, pp. 82–87, Sydney, Australia, September 2013.
  10. P. P. Chan and W. K. Song, “Static detection of Android malware by using permissions and API calls,” in Proceedings of International Conference on Machine Learning and Cybernetics, vol. 1, pp. 82–87, Lanzhou, China, July 2014.
  11. Y. Aafer, W. Du, and H. Yin, “DroidAPIMiner: mining API-level features for robust malware detection in Android,” in Proceedings of Security and Privacy in Communication Networks. SecureComm 2013, pp. 86–103, Sydney, Australia, September 2013.
  12. T. E. Wei, H. R. Tyan, A. B. Jeng, H. M. Lee, H. Y. M. Liao, and J. C. Wang, “DroidExec: root exploit malware recognition against wide variability via folding redundant function-relation graph,” in Proceedings of 17th International Conference on Advanced Communication Technology (ICACT), pp. 161–169, Seoul, South Korea, July 2015.
  13. H. Gascon, F. Yamaguchi, D. Arp, and K. Rieck, “Structural detection of Android malware using embedded call graphs,” in Proceedings of the 20th ACM Conference on Computer and Communications Security, pp. 45–54, Berlin, Germany, November 2013.
  14. Y. Liu, Y. Zhang, H. Li, and X. Chen, “A hybrid malware detecting scheme for mobile Android applications,” in Proceedings of the 2016 IEEE International Conference on Consumer Electronics (ICCE), pp. 155-156, Las Vegas, NV, USA, January 2016.
  15. I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, “Crowdroid: behavior-based malware detection system for Android,” in Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 15–26, Swissôtel Chicago, Chicago, IL, USA, October 2011.
  16. Y. J. Ham, D. Moon, H. W. Lee, J. D. Lim, and J. N. Kim, “Android mobile application system call event pattern analysis for determination of malicious attack,” International Journal of Security and Its Applications, vol. 8, no. 1, pp. 231–246, 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Zou, J. Zhang, and X. Lin, “An effective behavior-based Android malware detection system,” Security and Communication Networks, vol. 8, no. 12, pp. 2079–2089, 2015. View at Publisher · View at Google Scholar · View at Scopus
  18. W. Enck, P. Gilbert, S. Han et al., “TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones,” ACM Transactions on Computer Systems, vol. 32, no. 2, 29 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. M. Rahman, M. Rahman, B. Carbunar, and D. H. Chau, “Search rank fraud and malware detection in Google Play,” IEEE Transactions on Knowledge and Data Engineering, vol. 29, no. 6, pp. 1329–1342, 2017. View at Publisher · View at Google Scholar · View at Scopus
  20. A. Narayanan, M. Chandramohan, L. Chen, and Y. Liu, “Context-aware, adaptive, and scalable Android malware detection through online learning,” IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 1, no. 3, pp. 157–175, 2017. View at Publisher · View at Google Scholar
  21. X. Jiang, An Evaluation of the Application (“App”) Vertification Service in Android 4.2, December 2012, http://www.malgenomeproject.org/.
  22. N. Peiravian and X. Zhu, “Machine learning for Android malware detection using permission and API calls,” in Proceedings of the IEEE 25th International Conference on Tools with Artificial Intelligence, pp. 300–305, Herndon, VA, USA, November 2013.
  23. X. Hu, T. C. Chiueh, and K. G. Shin, “Large-scale malware indexing using function-call graphs,” in Proceedings of ACM Conference on Computer and Communications Security, pp. 611–620, Chicago, IL, USA, November 2009.
  24. D. Haussler, “Convolution kernels on discrete structures,” vol. 646, Department of Computer Science, University of California at Santa Cruz, Santa Cruz, CA, USA, 1999, Tech. Rep.report View at Google Scholar
  25. X. He, D. Cai, and P. Niyogi, “Laplacian score for feature selection,” in Proceedings of 18th International Conference on Neural Information Processing Systems, Vancouver, BC, Canada, December 2005.
  26. A. K. Jain, “Data clustering: 50 years beyond K-means,” Pattern Recognition Letters, vol. 31, no. 8, pp. 651–666, 2010. View at Publisher · View at Google Scholar · View at Scopus
  27. https://en.wikipedia.org/wiki/Process_identifier.
  28. https://github.com/pjlantz/droidbox.
  29. http://developer.Android.com/intl/zh-cn/tools/help/monkey.html.
  30. N. S. Altman, “An introduction to kernel and nearest-neighbor nonparametric regression,” The American Statistician, vol. 46, no. 3, pp. 175–185, 1992. View at Publisher · View at Google Scholar
  31. V. N. Vapnik, The Nature of Statistical Learning Theory, Springer Science & Business Media, New York, NY, USA, 2013.
  32. https://virusshare.com.
  33. https://www.wandoujia.com.
  34. https://en.wikipedia.org/wiki/Sensitivity_and_specificity.