Automatically locating malicious packages in piggybacked Android apps
To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app co...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3697 https://ink.library.smu.edu.sg/context/sis_research/article/4699/viewcontent/p170_li__1_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-4699 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-46992017-11-15T02:47:03Z Automatically locating malicious packages in piggybacked Android apps LI, Li LI, Daoyuan BISSYANDE, Tegawende KLEIN, Jacques CAI, Haipeng LO, David LE TRAON, Yves To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth set of piggybacked apps, we are able to automatically locate the malicious packages from piggybacked Android apps with an accuracy of 83.6% in verifying the top five reported items. 2017-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3697 info:doi/10.1109/MOBILESoft.2017.6 https://ink.library.smu.edu.sg/context/sis_research/article/4699/viewcontent/p170_li__1_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security Software Engineering |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Information Security Software Engineering |
spellingShingle |
Information Security Software Engineering LI, Li LI, Daoyuan BISSYANDE, Tegawende KLEIN, Jacques CAI, Haipeng LO, David LE TRAON, Yves Automatically locating malicious packages in piggybacked Android apps |
description |
To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth set of piggybacked apps, we are able to automatically locate the malicious packages from piggybacked Android apps with an accuracy of 83.6% in verifying the top five reported items. |
format |
text |
author |
LI, Li LI, Daoyuan BISSYANDE, Tegawende KLEIN, Jacques CAI, Haipeng LO, David LE TRAON, Yves |
author_facet |
LI, Li LI, Daoyuan BISSYANDE, Tegawende KLEIN, Jacques CAI, Haipeng LO, David LE TRAON, Yves |
author_sort |
LI, Li |
title |
Automatically locating malicious packages in piggybacked Android apps |
title_short |
Automatically locating malicious packages in piggybacked Android apps |
title_full |
Automatically locating malicious packages in piggybacked Android apps |
title_fullStr |
Automatically locating malicious packages in piggybacked Android apps |
title_full_unstemmed |
Automatically locating malicious packages in piggybacked Android apps |
title_sort |
automatically locating malicious packages in piggybacked android apps |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2017 |
url |
https://ink.library.smu.edu.sg/sis_research/3697 https://ink.library.smu.edu.sg/context/sis_research/article/4699/viewcontent/p170_li__1_.pdf |
_version_ |
1770573674728914944 |