4
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: not found

      Signature Based Malicious Behavior Detection in Android

      chapter-article

      Read this article at

      ScienceOpenPublisherPMC
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          User’s security and privacy are of increasing concern with the popularity of Android and its applications. Apps of malicious nature attempts to perform activities like information leakage and user profiling, detection of which is a challenge for security researchers. In this paper, we try to solve this problem by proposing a behavior based approach to detect malicious nature of applications in Android. Events and behavioral activities of an application are used to generate signature, which then is matched with signature database for detection. Behavioral signatures are designed on the basis of information leakage attempt, jailbreak attempt, abuse of root privilege and access of critical permissions. 260 popular apps of different nature were evaluated in addition to 42 android apps, which were flagged malicious by Government of India. The proposed system shows promising results to detect malicious behaviors. It also defines the nature of malicious activity exploited by an app.

          Related collections

          Most cited references8

          • Record: found
          • Abstract: not found
          • Article: not found

          MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              ICCDetector: ICC-Based Malware Detection on Android

                Bookmark

                Author and article information

                Contributors
                nirbhay.chaubey@ganpatuniversity.ac.in
                satyen.parikh@ganpatuniversity.ac.in
                kiran.amin@ganpatuniversity.ac.in
                vikas.sihag@policeuniversity.ac.in
                spu16cs04@policeuniversity.ac.in
                mvardhan.cs@nitrr.ac.in
                psingh.cs@nitrr.ac.in
                Journal
                978-981-15-6648-6
                10.1007/978-981-15-6648-6
                Computing Science, Communication and Security
                Computing Science, Communication and Security
                First International Conference, COMS2 2020, Gujarat, India, March 26–27, 2020, Revised Selected Papers
                978-981-15-6647-9
                978-981-15-6648-6
                08 June 2020
                2020
                : 1235
                : 251-262
                Affiliations
                [6 ]GRID grid.427705.3, ISNI 0000 0004 1806 4993, Ganpat University, ; Gujarat, India
                [7 ]GRID grid.427705.3, ISNI 0000 0004 1806 4993, Ganpat University, ; Gujarat, India
                [8 ]GRID grid.427705.3, ISNI 0000 0004 1806 4993, Ganpat University, ; Gujarat, India
                [9 ]Sardar Patel University of Police, Security and Criminal Justice, Jodhpur, India
                [10 ]GRID grid.444688.2, ISNI 0000 0004 1775 3076, National Institute of Technology, Raipur, ; Raipur, India
                Author information
                http://orcid.org/0000-0002-2120-1296
                http://orcid.org/0000-0003-2944-7896
                Article
                20
                10.1007/978-981-15-6648-6_20
                7971767
                f7c91a7b-9929-4ffa-a6de-3d1f0cf29529
                © Springer Nature Singapore Pte Ltd. 2020

                This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.

                History
                Categories
                Article
                Custom metadata
                © Springer Nature Singapore Pte Ltd. 2020

                malware,android,security,dynamic analysis,information leakage

                Comments

                Comment on this article