Reference : A Forensic Analysis of Android Malware -- How is Malware Written and How It Could Be ...
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/18702
A Forensic Analysis of Android Malware -- How is Malware Written and How It Could Be Detected?
English
Allix, Kevin mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > > ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)]
Jerome, Quentin mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) >]
Bissyande, Tegawendé François D Assise mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Klein, Jacques mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)]
State, Radu mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) >]
Le Traon, Yves mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Jul-2014
Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference
IEEE Computer Society
COMPSAC '14
384--393
Yes
International
978-1-4799-3575-8
Washington, DC, USA
IEEE 38th Annual Computer Software and Applications Conference (COMPSAC 2014)
from 21-07-2014 to 25-07-2014
Västerås
Sweden
[en] Android Security ; Digital Forensics ; Malware Analysis ; Malware development
[en] We consider in this paper the analysis of a large set of malware and benign applications from the Android ecosystem. Although a large body of research work has dealt with Android malware over the last years, none has addressed it from a forensic point of view. After collecting over 500,000 applications from user markets and research repositories, we perform an analysis that yields precious insights on the writing process of Android malware. This study also explores some strange artifacts in the datasets, and the divergent capabilities of state-of-the-art antivirus to recognize/define malware. We further highlight some major weak usage and misunderstanding of Android security by the criminal community and show some patterns in their operational flow. Finally, using insights from this analysis, we build a naive malware detection scheme that could complement existing anti virus software.
http://hdl.handle.net/10993/18702
10.1109/COMPSAC.2014.61
http://dx.doi.org/10.1109/COMPSAC.2014.61

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
A Forensic Analysis of Android Malware.pdfPublisher postprint247.04 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.